Analysis

  • max time kernel
    129s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2025 00:10

General

  • Target

    RisingStrip.exe

  • Size

    1.1MB

  • MD5

    754abb74ca81d5ac0338dc27c0419467

  • SHA1

    6b1266ea2b305178dc1b7bd17e4bf22c2ef6417e

  • SHA256

    ea8c2ccdcad3914c89165d94a5916986ee9ba4fbccce3563eaa5facba38cceb6

  • SHA512

    42eb7b838aa0b6009d5f5cf214797837b5876c6ce312ecebcf0864a5a82c85a71c854f0e4410c2aaa6d7fc147ed07584ae49011909290808e9d64dbfe3814cd2

  • SSDEEP

    24576:gmrT0o4MiMwK5w91RKUfX9F2sLwS6TJPTP/ACvFL0i+ZESls7emA:109MwK5+/KUP9F2MbirP/ACvFLSEPA

Malware Config

Extracted

Family

vidar

Botnet

hu76fa

C2

https://t.me/w211et

https://steamcommunity.com/profiles/76561199811540174

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RisingStrip.exe
    "C:\Users\Admin\AppData\Local\Temp\RisingStrip.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Vids Vids.cmd & Vids.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2820
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2568
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 91531
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Shepherd
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2576
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "copyrighted" Tell
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2632
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 91531\Red.com + Certificates + Mountain + Hydraulic + Advances + Am + Belongs + Housing + Viral + Bound 91531\Red.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2900
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Generated + ..\Er + ..\Soma + ..\Sponsors + ..\Identifies + ..\Phentermine + ..\Applying + ..\October q
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1792
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\91531\Red.com
        Red.com q
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:780
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\91531\Red.com

    Filesize

    2KB

    MD5

    060137875d3752d5ce6408c7fcfcb3f2

    SHA1

    7c510b504839d4c1c5af60ed2efc7dd6273de707

    SHA256

    a2bd57fa77d5932294485ce02702d4980c3b9b9956ad8c75529ef6736e2724de

    SHA512

    004d14560181c647ca2fefe9950e2aa020389828c1020937e33f3d9cfe2abc24fbd37447bda0b8dbf7beddcfec40cfec5ed062a5ff75b1c2abf82271e620a550

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\91531\q

    Filesize

    525KB

    MD5

    0fa1961f4d1ca0b03c3ed6a3f009583c

    SHA1

    985a75402c71ba01111bb0620b13b0f66725d41b

    SHA256

    127cefc5b81045b30c5f092179e7e97eb75ccdfc9387448c2a4cf92512d3e3b4

    SHA512

    f66bbdff11b46c88c6689b9cde97972cfa04b720d42177ebf027adb4e83de820ecf8e6e044fd4a6a27aab8148ba6f695cf92b7ee16d94dc7f738644afb27de7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Advances

    Filesize

    108KB

    MD5

    6904f7337aa9ad6c48cfc5c471e3c20c

    SHA1

    0f9e39e08dc4aa0a44f09ec09002627db26949d9

    SHA256

    cb6613a10eb47e895de742d89b2b024dd0803f86e05ff474361fd5f774bcc38c

    SHA512

    90907088d4b9af908d2256ec349ccb54359f94fc608a1ea91ecd8898ae1a734a66c44eab378b31efa2fec1d8a83118f96791a00de0160e4d29a4263b15876628

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Am

    Filesize

    125KB

    MD5

    cd644469961faf5e8bc1dfba94275cdc

    SHA1

    821a405044ae939e971a250e3b60096ec67428fc

    SHA256

    413b085d3d1aa5f3fdf6ecf8caaad59f59e0c88005a4ae4e111bcbcb5bca450d

    SHA512

    b9c3b3650ca6d3b8ddc2cfa07402af9a08e602a6ec03a1344f65408f7945d809e5676223e7337c39300ca003d32e3e270af69b615fa4932c398a3b326d96a6ba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Applying

    Filesize

    65KB

    MD5

    145aa3078ddcb6a602001f666c67988c

    SHA1

    f730cbe228b91ea8d8a50984096b154018c3d3e8

    SHA256

    d1e66a0a46199943f51a073f258b3c0d75ac771b1c0f12e26bb78d5e1355c3dd

    SHA512

    7087e1ec04e7374f1156b729b31a3b533fc5910c8577aee0a1b89e3ffe5f643f1715e174301b274f602c487db86f1c09870cd00fbd15d8b8b31e717992da503c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Belongs

    Filesize

    65KB

    MD5

    416dd26520f29f383415628f15885cac

    SHA1

    1a53099d7afc8a5edf28285e71ce924cca2a99b0

    SHA256

    40acc8ca05eede65b90f66a3ff4e3a8cbc43aa699a99ed591eb7ea5b47e65d6d

    SHA512

    41b016a7f5ab323aeb0c75f62d776d1652d5cce9eebd7bf835519add688ef4af0a73331d80efeeaf0f6fae431e5c40f8645f7a3091178502c9b42ddfe85b2fe0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bound

    Filesize

    14KB

    MD5

    c8107433238258dd5f5a1cd5260d117c

    SHA1

    c9f98e7baddea514c7906cd4ce19e41a5ffd9066

    SHA256

    858e9b693f7b359ed1520225132f4dca8a8eb684a7667674e8b01c0573378a5a

    SHA512

    33dcd58400cb6ca06a5c3dee7b0350adacbd660a1c6747d65c39359ed05aeceaa9a04cd1dd455164babffc4c4948c941725dc7b78bb59f42e0de87d8ffb3f021

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Certificates

    Filesize

    136KB

    MD5

    569eca29c0fa0925877c9267f757a729

    SHA1

    c3d004b4096a26580c85310ce7da829fbb850b6a

    SHA256

    d7e8a9c79cc85ab6388b3345b87647da20e5e0e07c7ae11b9fe058b9d0ab5a2c

    SHA512

    89ce46f4c42743ff4d90e7b35baeabdb6a34ff7e9df790c11e86356f364fdcd92f4595297f33c7d96ffe4dc8ce44d502568797f153bbbd237b37af6a057681cd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\76561199811540174[1].htm

    Filesize

    34KB

    MD5

    4cc9be066c5b475ac2e5afe9ed7a503b

    SHA1

    8a716e4f6dd630fe2095522917eb489aa73a10f9

    SHA256

    0a0ab09eca6ded3e4becae44783723c134722b6b3c632a871e85362b18e7d7e2

    SHA512

    20d56ebce91246c2873572366b4ed4f46da667f2a76dbc1605b19c263ca3c5c24838db54288a2c9628e65e98492c3e43b0d96013c98ac44a6eb86638da4142b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Er

    Filesize

    54KB

    MD5

    611d83ed2ebc3f773e88c5cb67fddc9e

    SHA1

    1e7d3f330866cd42834ddf9f0491634e78433940

    SHA256

    efda3be75fbd8d2113e3beacbfb235b2043c1fa01010fd1430fb2a1d492153a3

    SHA512

    c0c5a37ea4c15875fef39e5382bc208cff28f785a04d07a20d1aeb0556eb58514b8da668387ab2f7c733717c55392c990a5331b4d28660515325786e3c1d8ae5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Generated

    Filesize

    68KB

    MD5

    8b5192934ac59a034de5b078dc5562f2

    SHA1

    ad620e1f42ee54fb9f1d7a9a55063ef6a6d8d747

    SHA256

    45eff3c7e7a38059b585a41c35f722b6d7a69b8ffc480538184f83ab2056f917

    SHA512

    38417f85b58e79a6c347b21f1ff6a96f1bf4ea55649aac0dd17d5b358fa7d717c3735a31b9b7733df9041baa8f1019bb1069e788779c2b5d12dda14384218b18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Housing

    Filesize

    121KB

    MD5

    3171829243167c27acfd8cedf5d49a65

    SHA1

    48e13f73779d87ec6b88402bd24e1c7ad09e9127

    SHA256

    3597c452224707d9298b488a4ff8e01765782f8e4fef2074a1a5a8876000e00f

    SHA512

    0d587e719b0f22c2a8b401249ebc56a2108c60b7101618a5b873b8ed8136a0b396a43d3d746cf35ba7047f9809eba5f3f6b923209821868fdf76bddb7270ea80

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hydraulic

    Filesize

    149KB

    MD5

    455d525aca84ecfd7e5d0d9b3a4481c5

    SHA1

    723536c7025297dbc07eb31431d42a94f02566b3

    SHA256

    925115d277d0ae2b81220c91f3e2094edbecd871db4d86e3824d9ece9125ff65

    SHA512

    1606ace46384ff2bc545f5286fe55661353ac4e99ed5e052f2f392aff58757ceba6e3751fa2f098241a7cdf26984f815ddd1661072ccb978fc1fa1b2a32f8918

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Identifies

    Filesize

    57KB

    MD5

    acc4ad52515a1b052e0c1f8eec5d96bc

    SHA1

    8e4d82fae3f64f4af5edc1b7cf32b33729a1bf93

    SHA256

    a6803b14d546d5ea2d622931476af2c24620ecab06e02896409cf37a4093bc73

    SHA512

    50f289a9ce33eadfcb6aa9e110d6f0d507b8e627f3dfe4503ee82ae49ce0764d1dc18c084023cd4afac229f412241499fb592fe11f8ab34fb2033fc5325f7b9d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mountain

    Filesize

    118KB

    MD5

    c794301b564965f12f13d1cd40a5fefd

    SHA1

    7be3e690c0b6450f34f976f3332f1a781d823954

    SHA256

    21f222c907b9d5fa415e6f2fceddff8c3bea918bd77833e6d54f502c061b71c4

    SHA512

    2d938b240bef701c432e0b7a662bb723974c6065c2c4389def2366693a7e35a5abc2b31e86cf6dc1732530f4eecaadc7b0fee37ea6a7dbca4ccd0c9cb7af9a8c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\October

    Filesize

    45KB

    MD5

    aee11aea2381c12ec9f1961d1a013538

    SHA1

    d317838c84be67d8bcbe58be65f03b2bdce5804c

    SHA256

    5dd6658e50537c79afff3573b536af2bc8039c5c883d558cab138a473ecd0eec

    SHA512

    714827c27fa3b24684673b3805de4a569d951c01e3b465fe1979c62f97c4dd7985ebdeffaf6ac8d6d3df0db2de37d124d8aa2810194c5ab16c7c0c73940f763e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Phentermine

    Filesize

    74KB

    MD5

    ac14c61862a8cb717daa2c6db76b9339

    SHA1

    ab926567a731bd1edabb22aa82919d7d991f5656

    SHA256

    703e1f4e10b695e2af8cc31fa8a58c5ecbec53120a93660d45ef4e246c929c4b

    SHA512

    ca6e9704a048179383d12e385bd90487bd46e855ddfc90eb9a9c2a2ba22fdaac286c11df8464cdbdb11f21ca5f7dce69ae810dd63f54ed3a6d2a833d003b2f32

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Shepherd

    Filesize

    477KB

    MD5

    dce4062b9244b86f065c0c9affb4f4d9

    SHA1

    457352261a9d0e425e53ccb6470349b182b9997b

    SHA256

    0ad0ece68586795e81ec8fb741c8921da0d9313ccfb914edd281879c0bcb3aa7

    SHA512

    29cdc1f297249b5ab9bf1c2e19422b6bf5cfc26cbee9c578ccb44d611cabb60b422bd587ab777151e05ea9bdd7ee0517070dc0aa4a3b93565d4f30cdd4826579

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Soma

    Filesize

    97KB

    MD5

    60496a091a9ea1bbc094f05e99b97c59

    SHA1

    b5f1027b7ef09ad2de845f41f1176aca7f6c4a98

    SHA256

    d8cda13bedfbe42301518b6fd3be21cbc5f5f71b1f90e599f10a040c4f2f8187

    SHA512

    8419730cd685ad0a54fd83732d54eeb11a5e61d1954b12aef3f9d285f81b33e99f5b5254e5228f5599f3c94cbfa86a82be572c3efc98b312f54b6fc90ba10296

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sponsors

    Filesize

    65KB

    MD5

    656ea190b28a9bac8ab0d5b187140f9a

    SHA1

    6d8efa18c85ae11db23a81e8ed90db81d5a4bcdf

    SHA256

    0747bc669e6478658d3918f2f8b5f923256120d389b2e08d7be1da9e557bf025

    SHA512

    eee8dacbe9f9e811bbf38da4a63042d94e31c668dfd796f795c65c7e94510f4103365cad904b907d1588f932db257c61fb6b5df7ef475ffaa6fbca9e7d4aa94a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tell

    Filesize

    2KB

    MD5

    dfe652afbebbc1b660cddbcb2b233d7d

    SHA1

    fb34587876860a137fe771e48203683d081f1038

    SHA256

    30b29459807e319ab41ea8f3cd5f74ae313ce13b6c47824cc6b624d710e58937

    SHA512

    8ff0dcdc11b6ae0f063e95ea1f5bbf18da6401253e764afbf8cc6963d7eea6e85cb801a0c367c09971925fb3aa797fa5566ab20dc9f6a38d97c86f0182da11e3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Vids

    Filesize

    11KB

    MD5

    906376b121991d311866dc29dcd592f1

    SHA1

    6c042814f04cb81d45d7af80b5725404ff2c2db1

    SHA256

    ab7910f330d97f36810f3c18c914aa926c7f261602880abdd112b6027e4f1d8b

    SHA512

    c26ddf67c6796dab4389ce1f788036a8b05775702904f066ed290c219a774ba8a809deca272a82df0458480c99dbe6466073c439c4c19f1e5315772d3cb1f0d7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Viral

    Filesize

    86KB

    MD5

    aaf850524bebfa693f2023b4a1e5bc22

    SHA1

    99131ffc63b4035883bc0682510d66b705d71981

    SHA256

    54b6cf9b5ad0e86c1af5e98bef8eca355423b7fb5fb66298758df0305069105b

    SHA512

    44cff7143d602a8ed43f2027d9896c5e73448e167a1d4829749fde30b6e60e6be0660a5a1137cc3ec44f3d9f717bedc6f2fcbb80cb2aebb5adddb53c415e79d3

  • C:\Users\Admin\AppData\Local\Temp\Cab3CE3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3D05.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\91531\Red.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/780-75-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-74-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-73-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-72-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-71-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-69-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB

  • memory/780-70-0x0000000003AB0000-0x0000000003B10000-memory.dmp

    Filesize

    384KB