Analysis
-
max time kernel
39s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 14:03
Static task
static1
Behavioral task
behavioral1
Sample
updater.exe
Resource
win7-20241010-en
General
-
Target
updater.exe
-
Size
5.0MB
-
MD5
0eb5d5bc68a30d4fa858a260c0607e20
-
SHA1
edec0acf854acbce18471c2b6789cc503a0f0171
-
SHA256
964ff006219ac3c428ecd794a7727c3d6e67e28b32380bf60ad9aaecaccbb496
-
SHA512
74e810cc4efd231542654a2ce8c6cb9a1ce994c639ed53b5549ee58eed391652e8fe9b0c490651e2a45dc72f7bd8e835de119e5a061bd5651abdc4833ad52867
-
SSDEEP
49152:IA4X4G8oYAuLzdgH0v7PyLi9SjUWjV7ywUG1l7hMEUhfROOtKnxivNTUKwCnRP59:IXX4GeHdgUjPynVJhnxowoY
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/800-2-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/800-3-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 27 3860 Process not Found -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3664 set thread context of 800 3664 updater.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4748 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95 PID 3664 wrote to memory of 800 3664 updater.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NzU4MDY4OTU3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4748