_UnhandledExceptionFilter@4
Behavioral task
behavioral1
Sample
uykb.exe
Resource
win7-20240903-en
General
-
Target
uykb.exe
-
Size
272KB
-
MD5
37797bbf221a8b210a987c3822ee35fc
-
SHA1
eaa09aee812bd2466c0b750f9edc7e66088c38e2
-
SHA256
76106d902328efa1e4a8c815e57a130f763a0a1ed5bfd1ba5707874c3ddaa84c
-
SHA512
9378befe69eb34494bf2b431147d2cd97bbcd8cc3dd173a097aa0e6facca00314d1f6d843c9a5b09866ec37c13c602833447c4fe52bbbec545d1b9ef544e440b
-
SSDEEP
3072:ne/3hGz8Su8ucwsy7vf7Qy63S9scCh4slxWsr7i9O3WWsZHpV0iukwEEfzqygF/S:n6xqucZy7vf8f3oMRxb/3W1Hp91Gq
Malware Config
Extracted
vidar
https://t.me/m08mbk
https://steamcommunity.com/profiles/76561199820567237
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource uykb.exe
Files
-
uykb.exe.exe windows:6 windows x86 arch:x86
9fa03dc67d87598889edf28a24bc9b26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetComputerNameA
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetLogicalProcessorInformationEx
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemPowerStatus
GetSystemTime
GetTickCount
GetTimeZoneInformation
GetUserDefaultLocaleName
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatusEx
GlobalSize
HeapAlloc
HeapFree
InitializeCriticalSectionEx
IsWow64Process
K32EnumProcessModules
K32GetModuleBaseNameA
K32GetModuleFileNameExA
LoadLibraryW
LocalAlloc
LocalFree
MapViewOfFile
OpenEventA
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ReadProcessMemory
SetFilePointer
Sleep
SystemTimeToFileTime
TerminateProcess
UnmapViewOfFile
VirtualQueryEx
WaitForSingleObject
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
msvcrt
??2@YAPAXI@Z
??3@YAXPAX@Z
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_itoa_s
_splitpath
_wtoi64
atexit
free
isupper
malloc
memchr
memcmp
memcpy
memmove
memset
rand
srand
strchr
strcmp
strcpy
strcpy_s
strlen
strncpy
strstr
strtok_s
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetCurrentHwProfileA
GetUserNameA
GetUserNameW
RegCloseKey
RegEnumKeyExA
RegGetValueA
RegOpenKeyExA
RegQueryValueExA
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
user32
CharToOemA
CharToOemW
CloseDesktop
CloseWindow
CreateDesktopA
EnumDisplayDevicesA
GetDC
GetDesktopWindow
GetKeyboardLayoutList
GetWindowRect
MessageBoxA
OpenDesktopA
ReleaseDC
wsprintfA
wsprintfW
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsnprintf_s
__stdio_common_vsprintf
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteObject
GetDeviceCaps
SelectObject
ole32
CoCreateInstance
CreateStreamOnHGlobal
GetHGlobalFromStream
oleaut32
SysAllocString
SysFreeString
shell32
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
freeaddrinfo
getaddrinfo
htons
recv
send
socket
shlwapi
PathFileExistsA
PathMatchSpecA
ord155
ord156
StrStrA
crypt32
CryptBinaryToStringA
CryptUnprotectData
wininet
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
bcrypt
BCryptCloseAlgorithmProvider
BCryptDecrypt
BCryptDestroyKey
BCryptGenerateSymmetricKey
BCryptOpenAlgorithmProvider
BCryptSetProperty
dbghelp
SymCleanup
SymFromAddr
SymGetLineFromAddr64
SymInitialize
SymMatchString
SymSetOptions
Exports
Exports
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ