Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 06:46

General

  • Target

    ab15ed3fb089ef3562d68a210b3529cf.exe

  • Size

    968KB

  • MD5

    ab15ed3fb089ef3562d68a210b3529cf

  • SHA1

    949a7af9cc19ce5c5faae300ec656ace1d87b8ed

  • SHA256

    9f12acce686f5362f7c9c79462f5e938bf56f2c822258451ff14f7b28fdfd3d6

  • SHA512

    d672795b5bc58f76bd4343a61eab91352217469925567e9cf848c86b65c9fe026980b0cef756a2b814ac6923c22565b0c288ab7b10655a65c48d7ddbaef8c24d

  • SSDEEP

    12288:/Ci8Pn4cxVHyNVQ6EjWFSy7j0qITE78+CrZ9UbXqOl4kr/IwTKwRKqvz3Mj2qj9B:/58PHxwqWZ7j09Z9UbqOl5/NKwfvz38

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/m08mbk

https://steamcommunity.com/profiles/76561199820567237

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab15ed3fb089ef3562d68a210b3529cf.exe
    "C:\Users\Admin\AppData\Local\Temp\ab15ed3fb089ef3562d68a210b3529cf.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Rc Rc.cmd & Rc.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1444
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1152
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2472
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 770098
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2500
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Stunning
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2588
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Vote" Release
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 770098\Insurance.com + Tamil + Bulgaria + Bend + Eye + Jungle + Trial + Thick + Train + Intention 770098\Insurance.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Dealt + ..\Buffer + ..\Pediatric + ..\Tee + ..\Simply + ..\Exceed Y
        3⤵
        • System Location Discovery: System Language Discovery
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\770098\Insurance.com
        Insurance.com Y
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2340
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\76561199820567237[1].htm

    Filesize

    25KB

    MD5

    58cb9405181e7d8631c5b672116c347f

    SHA1

    73d251c3d351eed56cf1e859d7fb6c7f440ace8f

    SHA256

    f4e6c5d6bd447ed68a137a88dbee7acb7c17f9bcb5d54e606383f6896edf2c59

    SHA512

    5cfee7bdf632f4a6829aacc52d1c0a67193f465d7a1b6852edaae6a30788c5bacf855da286cb88dc321b9108a033d1e8de79c6c487d2a1edc70f1af6c04e11a1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\76561199820567237[1].htm

    Filesize

    34KB

    MD5

    03a0cb36e2644ff0924c3ea2495213f4

    SHA1

    6e66557cada6eb00b8a91a4d01fe58e958c86999

    SHA256

    8d84e5aba7bb3419e95063eee39497572ca23e441d05d662c5c4b876604f719f

    SHA512

    7f4657c63324be347b61cd180849f8f81ce41074fad7fe776116e2ceff9bbb6e8c2e46ebb2bcde52b297734167c6c67baed88597046e9c8f3883397bb633596b

  • C:\Users\Admin\AppData\Local\Temp\770098\Insurance.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\770098\Y

    Filesize

    390KB

    MD5

    6b3aa16ac1bb7ea46a579aea273960fa

    SHA1

    102c3effbf88d5918947583bbaf6cb80e39d180f

    SHA256

    5f33651892aa4b56fb2f4c9566668001c12fe11418d78eabc0b758125a3456e1

    SHA512

    1c715fcf4e166495f3c6f576da8c93108de3957b6cfe2eeb70e815e5b8ab47da86c5c8c7b1ee9e0d235d6ff3fb8ae510c7961eab803386a063a714256ce49618

  • C:\Users\Admin\AppData\Local\Temp\Bend

    Filesize

    107KB

    MD5

    774c8483cfb30278888e790fcbc64dbe

    SHA1

    595ed8cab57bae2794e95f5fe0b1dbebbdcd2daf

    SHA256

    e0a71d1af7fcd22f1dff2ebb2d16e8c1c874ac4ea43f11183141ed35f14bce44

    SHA512

    9739b8e02e8cc10491d7dd842a927402c3603eb5eaa9e19bd6a7d0c63a3eff22ac321efbec81b58222b72bd8ee27441b08cbbcd7157409c891e2b164576de442

  • C:\Users\Admin\AppData\Local\Temp\Buffer

    Filesize

    64KB

    MD5

    e68fdafec00d75ab01141fe6e712ea17

    SHA1

    a2843eda89e2e2c5a706cdb87436e756de231a7d

    SHA256

    b5f78b33dfa24e816fd0ca249adf98d04c3c1a2f5c4562b2612f57aae945e9ec

    SHA512

    74193f01e2e6aacc5273a5ba2d2f9d4cfcb0740dfa0861b3e571aba14d820d6f91358954abf4f4ffa09bbcffcc3549b0d734db4ade9a5e25a54fa745e8289e3b

  • C:\Users\Admin\AppData\Local\Temp\Bulgaria

    Filesize

    95KB

    MD5

    3c9e1a555f839cded2f56061ef5a4735

    SHA1

    992a0eff62bb26f46fc20a08df7a7a5dbed69a96

    SHA256

    667e6028009d9a61a5b77467811e872868d8d929db65a27123f2ea8d179c3dd4

    SHA512

    599fb5804c6cb132f3219c16211c16b1ef1c3569156b8e234b79753fe95693f3ac3e058da26d45f7538704179cc598a5d75e3b6007588167fedeac2e6c1886f1

  • C:\Users\Admin\AppData\Local\Temp\CabC1CB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Dealt

    Filesize

    76KB

    MD5

    b5ecbf5bd83e9871cb8ead76ec20051c

    SHA1

    9438d2ff063487731c489e59526926f48cbec428

    SHA256

    c1f8cb909b6648b8d8e47e3a1563f3f0ae1f62066c6f2de9d438366bb7e4cf27

    SHA512

    1ebc8cc6f5b6690894c84491bbc93e809892571bd0d1ea0d56d14f334d058421f792e6711e0530d5b189f5913083b4ba157e719ed5b7446bb207fca3026c8c17

  • C:\Users\Admin\AppData\Local\Temp\Exceed

    Filesize

    66KB

    MD5

    4ae7b96e34c1114ede6f4318a2cba398

    SHA1

    599209c88c03d2b74270c2c604beef716eb20313

    SHA256

    8c3b94aeafcaf68ee3d3893f9f832bd900914c4d3228bdb8c39de307aa6697e6

    SHA512

    778a38d4ab08b32c6bbdddb522ca2f081befdc788c71d81cc308b1219603328a688817208863720299e4cb161a21769c7291b6d4ae2d9a4c53c0a4d1d9f1512b

  • C:\Users\Admin\AppData\Local\Temp\Eye

    Filesize

    121KB

    MD5

    9b1e264982aef7d79099e7e6e0f19e5e

    SHA1

    b484a6c6ef23831ce573a7f196c1944d54bdc99b

    SHA256

    66e91f3ccb693103a470bfbed0d60d71339fe35c36fc868958a2ea44cddecf40

    SHA512

    1979f066a559c587c538809e503b1145a91745f4d53d48307aed12bc7a14944b91debeb27d3324d789ed9a77a63707c221c88a998c6c2614a28a2e0a230c6d37

  • C:\Users\Admin\AppData\Local\Temp\Intention

    Filesize

    61KB

    MD5

    670d27ef0a60d84566347acce7bd81c6

    SHA1

    462257c2c8b81d49f86a0146d9ca59eb2f26ce0d

    SHA256

    028810bb27f8972864273e1d9fdc41be2b55330c98fd293fbb86cf9d4d7037c3

    SHA512

    168a0e0f69b613c03c36910d23d68d32e1e826903b62113b68c4b2db80b2cb00ac4f67e1dc79e7fab7f03f3b6d629b74f312eb14665df5e23940abf0e10eef28

  • C:\Users\Admin\AppData\Local\Temp\Jungle

    Filesize

    139KB

    MD5

    94e26e8ce4f0ed310d9f1ea466f45812

    SHA1

    7fe85280d4e3a3f6f4a116a943f8f95e09a2cafc

    SHA256

    b64460a29d71a33d4921097e8e2c37a7c9716ccd45f174e16cbae12598727ee5

    SHA512

    abc3f0a5d6d2e8ae20b0710965b6789527ef99554ff97507138874e248989be9b9b043ee91b443b35dba128567ec3516061f7317fd0dddf3e13442f5c12c40c2

  • C:\Users\Admin\AppData\Local\Temp\Pediatric

    Filesize

    63KB

    MD5

    d0e1c3e19437e9e7f0727c2f44835e06

    SHA1

    dc33aabd1fc617b830aee13bbb657b057124fe70

    SHA256

    b80f6acba522ac8bed4c7fa9be5b7d8a27bf6a3f8bab8cfb9597ea2beb65d081

    SHA512

    14a52ccbb0652c51819139574a269e86206eda13aec1e2b8e9500a8324b726b1455b4d68d8786ae7c2f10c0bdf888eae9b40bed9ec067e03bf48f0d3910e748d

  • C:\Users\Admin\AppData\Local\Temp\Rc

    Filesize

    11KB

    MD5

    eecf2aeda96399694557db46f43e5e32

    SHA1

    6372b502269f1878a2415e1085299836b711964e

    SHA256

    ac5a51ae158468f0a1d86889421d623843cf6dd0055f2d5108ac6079a918c8f3

    SHA512

    80f51838651f8274b360edad489593accfdcde4626b63d6accb166a6ed43d22f90d097edc28c7e6c87f70cc86d29518cd3c002a650c2cf2ea158a08484d17513

  • C:\Users\Admin\AppData\Local\Temp\Release

    Filesize

    1KB

    MD5

    1f13be8ef3b794f0f7290e04c92b8fd6

    SHA1

    6b7834a8bcbbddee3640ca989ec8298ebf725028

    SHA256

    30726222c7c4e227555f1325ad0afc8c1b147267a9600d8f1fa8ad10d00bffa7

    SHA512

    24e4002376085cc84a0de80dd9e941a44b6595528c1e2bb97a5e89c81472435d21126090eb81f2d9c983253a9da537c587914a69517bed6a9791209fd55190cd

  • C:\Users\Admin\AppData\Local\Temp\Simply

    Filesize

    71KB

    MD5

    cb834632ba320eee41a925dbb6d089e9

    SHA1

    1109185b8151d3a149476e58b14c86cb36b8d6ec

    SHA256

    07580c11c3bcaa04f4588b504c4fbaf54e2426be356aeddb85115b0402fd6f3a

    SHA512

    341f1b571113f07543191318fff0eb5db8a40f63e88870b0d921574ea8b1c85f98b91d57793834a225b18e7a778a9015d8f8155609382a6c6b05e2dbbdd04f9e

  • C:\Users\Admin\AppData\Local\Temp\Stunning

    Filesize

    478KB

    MD5

    8745909b9f391bd2816538d42233b56b

    SHA1

    90cea4b151fce531d9a7e73f73d4e703d8e930e6

    SHA256

    41e6ebd7fd0c469ee50f243d703b0240d3d1b874aae728af2b79bdc82cf3c14a

    SHA512

    12332bebf879c87e91b9e5a829ed25258604fc282a34e0c0f792ecb242658dbe76ce612999262b534f8d4502e42c86e4c3424814abb0c92ba954668d9902e2ef

  • C:\Users\Admin\AppData\Local\Temp\Tamil

    Filesize

    111KB

    MD5

    94c251a4b1d157c63dbbaceeeeed79fe

    SHA1

    0990a618d6714c7cb8f5929c75b73c8924671e23

    SHA256

    4e10cb3c9dd2757bfc93c596faae0c4f66b1ac2f60d8d1767b1fa95a166c88f2

    SHA512

    a336b30a7c4b2f62ba8d211fbf41cee8d933cef1aa37e6d6efcef4f7445b7bfe78e2be6ab61c70915bccca520edc12065593c281190a00156a3bcac2dd869b53

  • C:\Users\Admin\AppData\Local\Temp\TarC1DE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Tee

    Filesize

    50KB

    MD5

    94e4779d0e410fea6aba85786a0695e3

    SHA1

    b36c5d5631b0ab56e304531d4653f53bc30013bb

    SHA256

    c21afd39dca0848345988bf5d52f6b1d440ee9aee567af8c99cdf5113cc4808b

    SHA512

    a4521d0487c3d8ae8d896ba98a0cc4c6a00accece8461da55f007eec8c7da24cf4cd5aae8f10bf895e81447ee2c01aaf6f0cf0f68fec105e4ff0dae12b96ea10

  • C:\Users\Admin\AppData\Local\Temp\Thick

    Filesize

    127KB

    MD5

    30654b8943fc1b0e2fcf36c10080c219

    SHA1

    b9de3496814e37e4011fb89aff44962349649b22

    SHA256

    dbaa7f988a670d48ba1e5c179ffe9eba888b236590414eef368621be94045d56

    SHA512

    d4050042a0808dc5f907ef8fa35d57103374354cde5dbdc6085beefd8cab462c79ffe36135648fe2f8149460b9c11eeea223963ea27dac31a0915c731e07526a

  • C:\Users\Admin\AppData\Local\Temp\Train

    Filesize

    80KB

    MD5

    e9347d67eaa0b1789287af250f4e6ca7

    SHA1

    f8f1b1148ff85998ba2fbb65869d479267182e28

    SHA256

    ef1e9a7ddabcee96c3da2e500cfd56e68b98c9e7643cfdfc9bb9d09918898d39

    SHA512

    425fabe72e21343ee55b3db5032e0d5c11370362460a98173aca44f84f4061e2878c708f356470c119713be54071a583e92d9cfe9d3b8e7e1005474efd29132f

  • C:\Users\Admin\AppData\Local\Temp\Trial

    Filesize

    82KB

    MD5

    26ededd85695a46008ae1435fc44f89c

    SHA1

    0aea4fe188a64e569782a59958137416fe5c7360

    SHA256

    952c67a52cfa806724353c1436ec83829fb09c05b9931569a422a1012a53613b

    SHA512

    83dd277d930c68feea74a644a938dec133026e9543db48f9a86785151e30ac022c9bb13dd3ed4493faea3f91bbcf61e58fa0b19eed93e87ab9f2766c57cf2765

  • memory/2340-331-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-330-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-332-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-333-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-335-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-334-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB

  • memory/2340-329-0x0000000003660000-0x00000000036AB000-memory.dmp

    Filesize

    300KB