Analysis

  • max time kernel
    149s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-02-2025 03:16

General

  • Target

    435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598.exe

  • Size

    899KB

  • MD5

    1e854cc21a0a1e0d4529eafa30f00c46

  • SHA1

    7d46238f771042bee22b70555e69fbbecc556737

  • SHA256

    435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598

  • SHA512

    278a7cee7819d5cc685dd9c075639968798341bac23718b15441d3b9b0d723eb7836e0329c5c5f096f54dcce826e8ea871d033385b72464637391a14b61f33fb

  • SSDEEP

    24576:vZzss7nmV+EsC9s50bHp4H2gS1YuzusJGuYco03ddH:BI49EsqDH+cTG2NdH

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/sok33tn

https://steamcommunity.com/profiles/76561199824159981

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0

Signatures

  • Detect Vidar Stealer 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598.exe
    "C:\Users\Admin\AppData\Local\Temp\435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Elementary.potm Elementary.potm.cmd & Elementary.potm.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2364
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1828
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2244
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 190244
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2492
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Highest.potm
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2072
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Region" Automobiles
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1824
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 190244\Rna.com + Trials + Tour + Auditor + Indices + Interests + Bk + Not + Assessment 190244\Rna.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1804
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Contributing.potm + ..\Cm.potm + ..\Contents.potm + ..\Templates.potm v
        3⤵
        • System Location Discovery: System Language Discovery
        PID:936
      • C:\Users\Admin\AppData\Local\Temp\190244\Rna.com
        Rna.com v
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2136
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baf26d82fe7a9d5991e30d134549e9c2

    SHA1

    7fc6fe416e90ff378766a284434a130687ff1d21

    SHA256

    ea5377f159cd6c9ea6ce6f2a785843112fae0180d31007332c4dfc19482cab3c

    SHA512

    1dc12422b601579576f7a5134c03bfa09932e83a824fc0b77e88d9a82658a47c0320fe69ba83138898ba5dead5f4d6724465d697bcf5a2989bab0aaa0c13c55a

  • C:\Users\Admin\AppData\Local\Temp\190244\Rna.com

    Filesize

    2KB

    MD5

    3337e98d0dc3cbd9a354d9bee6151471

    SHA1

    ef39c95f8f3b37c9664139f9019bba2834fcdd84

    SHA256

    9f57412db4a30c849f6d1ac5a05cc5ce6dae560ab15cc6b650eefe3211bedd8c

    SHA512

    44cf758e6026bdb8921f9571824935af69a1f67d7c448c919ffa94c34e93f831f829e6421135046dee7d6c6af2d78809e02b6261589fd6fea0661bf3b27ff8e6

  • C:\Users\Admin\AppData\Local\Temp\190244\v

    Filesize

    255KB

    MD5

    7a0bccb93c8a02edd1c5d9e05ddea967

    SHA1

    6bc4f53e75666537503e8817f6f56e85ebb9a019

    SHA256

    7bb104d6e23ed9c640b2dd122daecd702820f2c47ed2209046d250d00a72fa74

    SHA512

    a4beddddb1f6b5734f9b7ee68307593eee5c236c8f6f899a13d032aaafad477f40c8d79a308106c554ae6bf85547344e16fb36473fe3582f12e3c1e63fe55a9c

  • C:\Users\Admin\AppData\Local\Temp\Assessment

    Filesize

    58KB

    MD5

    0bd1586903baca9d97c9d6dca8c8c254

    SHA1

    a6d50245b0d6b27c1ab432587b0ae894aead1e0d

    SHA256

    54862593de36d2c535da78a7feaa625ad65c1b9a20b6748c8783ca86d84a1600

    SHA512

    05ea18ca5a7c867c5b576c14997fab73cc2cdcafe669924f8e65a01454b8cb4cf34a35ec09a7c11a61611096bcf8859217f64654bb77fb6bd2f1919ed489abdc

  • C:\Users\Admin\AppData\Local\Temp\Auditor

    Filesize

    147KB

    MD5

    b7a356482dac71856517da3a1d840a1e

    SHA1

    d4f35e28a99e746de5e3595341c299ae1aae461a

    SHA256

    ae6980a117468381369152ddce4327795268203b51d18ebd22758e05d21331fb

    SHA512

    f86e35405370edb869a99d2c2707ca42533310e5f58e47252044cfbda3ef37659194cfd405d71772b6b66021d94254330556f3acceffebad326bef99d420db07

  • C:\Users\Admin\AppData\Local\Temp\Automobiles

    Filesize

    2KB

    MD5

    5520ce6e83b85995a3f57f879e92433b

    SHA1

    41916f28b67c393a97a583be39c45434aec8f053

    SHA256

    45048f13b1ef83fe730487316476ef75103b4b0cfcd3991982433140454b2ec8

    SHA512

    531805a93f9ab4365b07f6ad8cc8e714bed300692bc3bbb3e4f092978f3f4500a82d58a121634cb6cec63f71f6c062007eab57df4c1c9d58099404bbbea91cc8

  • C:\Users\Admin\AppData\Local\Temp\Bk

    Filesize

    144KB

    MD5

    596aac015f900ac08aabc3f6e7ebcfe6

    SHA1

    88dfb592cb71f0b0a53ffe08c923ee5449b106d3

    SHA256

    673af251fac4c441cd411f0dadc3c4659a96913fa04f8d8e58fbf29124304c83

    SHA512

    65da9cf93d985410c34f7ed9545f9ae27ad52c612e06665aee0753a0e082161f2ee26ade91cde047a12e2951cefb804729d83ee8d370b8030b2b6adb265541e8

  • C:\Users\Admin\AppData\Local\Temp\CabB962.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Cm.potm

    Filesize

    88KB

    MD5

    ea946bdf2f84accd7dfef4aadd7ceba0

    SHA1

    2b3e2257cb4132924adb6ffdf79c64ecd2e1bde7

    SHA256

    2625c1467ac13734c7ac9d6440113895a5166f913fb6a48ccc3b1b479d1cbda3

    SHA512

    7f3f9ca44c1ffec0f0b6b419d043c2f8547002e0d2139848787d077976591f01a9e77b960d95ae886ec4d9030293740d2f551851b053e827ffb8a00c6c810953

  • C:\Users\Admin\AppData\Local\Temp\Contents.potm

    Filesize

    68KB

    MD5

    3f570eacdb34cdf2de5cdf884b66a478

    SHA1

    795922094e89040c2a901098dba1275f122f6e90

    SHA256

    9fc76a453901a25a61c23c355bb8ffba38698fa841cfc2732c0de803a7167a52

    SHA512

    dea0c493792e13d3e1f9bf64c884dd9b575f0dcd2aadf3a004ffa5c62d5c2b0488b4fb670c5bdbd8f2a5c7da0254c5fc3109255a0ac29831176683b6dc4f921a

  • C:\Users\Admin\AppData\Local\Temp\Contributing.potm

    Filesize

    57KB

    MD5

    58324423292aba1fe85ce884cc359575

    SHA1

    79727d862731765ef1edabb4a42f8c315d525968

    SHA256

    10353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9

    SHA512

    ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48

  • C:\Users\Admin\AppData\Local\Temp\Elementary.potm

    Filesize

    10KB

    MD5

    6d2e9bdc77ef7d4073fe0a23d24b7346

    SHA1

    33045b56a62059a14756b961a8e4220a09fb035c

    SHA256

    6e44faaef0ad7290e3ecbeec66dde3b959460d650f252b62e6a294758d512313

    SHA512

    8c8d7edcda2c371c06a6bc882e056163e072a40b15df581bd7c7558d5bebf0e67dba3695855c9ad213cf17838f7cee3a340fb7222e0ddfec84b8fb21f999cbf4

  • C:\Users\Admin\AppData\Local\Temp\Highest.potm

    Filesize

    477KB

    MD5

    4a77c3ab191f746d3b90e7edd7a690c1

    SHA1

    b21a0452d3128c13f2156ca2d820a082daba8256

    SHA256

    e26de0520cbb1674087230ddcde9666da01f7110ff2a6f93de61d0c1a3dad891

    SHA512

    9484f6904ef6ade3967834b8ac9dce9a968954f20e25ffc5920dc43a64ec0ae308a17845e4c67ab9065aae78d0ce3be1b15b12335e2e1838cb805aa5611af3fe

  • C:\Users\Admin\AppData\Local\Temp\Indices

    Filesize

    142KB

    MD5

    166ac6a1dc2dfcb3c6060a5b9b486139

    SHA1

    3f5fd2334a522d0ef491564ee32aa75b60b6381a

    SHA256

    62e5f6a2f8b69ca1c158c35171331911fe425a3f30ae7f1fcd2a729bf58542ea

    SHA512

    b73c722624b7fa96065d6807c2fb2c89dee1a2ea0cbd191eba10f34b072e6b728c896cbd90948c3ded44ee9799dad39185f28bcae8aa66e1132ff2311f28a3ac

  • C:\Users\Admin\AppData\Local\Temp\Interests

    Filesize

    141KB

    MD5

    4ca1a161dd4632039343b82db96400cf

    SHA1

    554845c0de18cdae98ad03d5d56fa29bb289a70e

    SHA256

    6fae2d1ff6a92c8baacf4729d4aa4dc86670538c4838c80f3d7e789937161f29

    SHA512

    fa3382bb84a821d88734f625caf6cc49bc45347e16440f9bb1ab66d9e30e387dfece66e345be3f14ab9398c23b4623411189fd7ebdd6d1be660b4eaf1c52c86e

  • C:\Users\Admin\AppData\Local\Temp\Not

    Filesize

    58KB

    MD5

    9989fb1439ad4713d21c95cd32fbb324

    SHA1

    62d58a2ef4485af249b93d1b8efc55ec0c3edca5

    SHA256

    825301cc30094a52596d9c65605286cf7b25fd75f81c75d4180b2ad928abeca2

    SHA512

    94efeb94b04a2f561b9336546a14f980d883a2399dabc48c4af45314de5cfe285c79f6a363841d79351015bd74349aa843d962d5f6dec8e3f2b8e010c662681c

  • C:\Users\Admin\AppData\Local\Temp\TarB9B3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Templates.potm

    Filesize

    42KB

    MD5

    d685b3edf1832219412c49c1849c909d

    SHA1

    40a8faa278c5f2e815b7d4995f77976503a93bd1

    SHA256

    0012725c1b11f84029a45d7fbbc3a828acc9528b23ef8d56ffa11d6f9666373a

    SHA512

    7fdf0b5e25293bdc6146497e28605c76cdb803d3edb7b509b582a3df7b5695384237dbbcf08ea25d8cfa21c0029ea7392dc34100e2c40ea52083cee6b6259d38

  • C:\Users\Admin\AppData\Local\Temp\Tour

    Filesize

    113KB

    MD5

    7485c0fce23354afa6561551c1254076

    SHA1

    81fd42d1a52a7527ad93306aacaf08dbe55d3f78

    SHA256

    1316f14c8d58696ab58c7f9a2d1027ce279a545357e803d890804a03a7541904

    SHA512

    fdd06a49afca56e69705798a3b60686d5aea56952cb4af933962f745e2092bc8898c72cf5f9ff599e5de9be4ac823a0d8f0364645922e4ae27e71edc39ed0ba0

  • C:\Users\Admin\AppData\Local\Temp\Trials

    Filesize

    120KB

    MD5

    56b7d6178c8dbac508d037cc5adc64b5

    SHA1

    5928e363f17ce6c67b7d07e29efe1bfe40a7d80a

    SHA256

    e56bdaa45c504e01d1aee08291b9b1ac3344f18103da42e33067f9f43adec246

    SHA512

    f486b565a6df99dd7d7ef7de7e62d5a155f4ef62314a1992319bfe25b5e672b718470e2ff684be07c7871e760562a14596e217ac70c98f07b224011e3209c31d

  • \Users\Admin\AppData\Local\Temp\190244\Rna.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • memory/2136-309-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-312-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-311-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-313-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-310-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-308-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB

  • memory/2136-307-0x0000000003E80000-0x0000000003EA2000-memory.dmp

    Filesize

    136KB