Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 02:45

General

  • Target

    365a1d7527a31e7a51ec56f48baaab3b50b3d1a07989824b04deb1a1670b54cc.exe

  • Size

    1.5MB

  • MD5

    ecfaf71c4aebf2a54d73f101d7fc5af7

  • SHA1

    b7757c667c42b91b6cd892728b78296d30d86fe2

  • SHA256

    365a1d7527a31e7a51ec56f48baaab3b50b3d1a07989824b04deb1a1670b54cc

  • SHA512

    1fd87904b5d74cb4de4462588842b450723872479fecc5ab23afe2c65985fd0441c16ebd2ab831594bef9c6e421b689eeb7b7aa37f377a30cb55f336c6bc9ba9

  • SSDEEP

    49152:NOcxhqLzoQG2+52hpvZh9QjIVlqUGN87N:NOKcvdGeFhiglqUQ8h

Malware Config

Extracted

Family

vidar

Botnet

hu76fa

C2

https://t.me/w211et

https://steamcommunity.com/profiles/76561199811540174

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\365a1d7527a31e7a51ec56f48baaab3b50b3d1a07989824b04deb1a1670b54cc.exe
    "C:\Users\Admin\AppData\Local\Temp\365a1d7527a31e7a51ec56f48baaab3b50b3d1a07989824b04deb1a1670b54cc.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Covered Covered.cmd & Covered.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2408
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2204
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2208
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 254461
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2644
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Spaces
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "ensuring" Cove
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 254461\Pics.com + Briefly + Scenarios + Soa + Sustainability + Conflict + Integration + Expand + Bow + Family + Aerial 254461\Pics.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:300
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Tri + ..\Statistics + ..\Boxed + ..\Valuation + ..\Mint + ..\Interaction + ..\Distribution + ..\Mustang + ..\Oscar + ..\Mature C
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2880
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254461\Pics.com
        Pics.com C
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1120
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254461\C

    Filesize

    610KB

    MD5

    8ae28a07a1c13ba3f82c1d9fbb548787

    SHA1

    76e6e6f4b7a19423c2f8a73174cba21d873ec513

    SHA256

    1fb30cfb8dc3a06001bbac52eb594b6ba90358cd285edac0229f4acf5768dc6c

    SHA512

    c095e4dd818ecdbb1f7698374763ec7e0c97b2c36e2abd7d878f3b3ff7e6e444424aa3b250ea5b7887081a891316ae8ed016ae4510c6ebca2eaff13016594db4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\254461\Pics.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Aerial

    Filesize

    30KB

    MD5

    c94a57d55f2176eb4582372ce932037a

    SHA1

    26d586af8278faea480ca8d8b7f4eab8fcd092a9

    SHA256

    8ef913bf329277749535b710c1812e5da09703435c45a5e09741c4d04782a0c8

    SHA512

    46e61cbf24cebef29525bd9598d1a6dcf418bb95ea7253a627b781a71988cc8fde7ccd5b6e79594a843e246b73bc3eeff9aa667fecefff3fba1b34d0a1d34cc6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bow

    Filesize

    82KB

    MD5

    ab139a3ad512361fff673a121ce988fd

    SHA1

    f8e4c240f8c68f2bdeacf6324e66cec3bd7c6f3e

    SHA256

    edcb46625bf7aa86ea68ba502bcad2db4f20c8814b4a20689866dd0171502d27

    SHA512

    fe84dc5b522e0a16ab793303c19332a08c35627b8963756bdc37685617444f037e5a30d4d261ac5114175d1b3b673df0e9af1034f35eac941ff39151e8547ff5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Boxed

    Filesize

    73KB

    MD5

    512abb7ce00a996a3647346b7feb0d28

    SHA1

    ea285a998d64a926c35ba69465946e21bd407b66

    SHA256

    9bbccd760fdae147f25ce6c053fc1fe1e5b1521fc9c21b58332f990008bce5ca

    SHA512

    e3cf189b652e1c6c4a1ac79cdd49e268b4b6a1fb7e36a34ef6c21011a69bbe16093d79a8d248962c078ea6cfbcc136c041cbea520a0231211967fb72b310c946

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Briefly

    Filesize

    135KB

    MD5

    b14eaaf029dea3aeb4739ab9a29edefb

    SHA1

    a859b2e98190567307b3517c85244ebd7538f000

    SHA256

    7deb2632c720408db16d2cd241a8147484ee843740651ba6e5011cba319dd286

    SHA512

    4ccce0df01f4dd5ebd8f47446fc7f3d030adea7a982db22ac1d4b4595c5e55b03336cb715edb8e99d677b9aab8dca005c67e648b9305e4e301c129502837ea5f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Conflict

    Filesize

    68KB

    MD5

    db89f146df5bfbf3a3a07dbd0471b5ea

    SHA1

    24d86431df0dd409d96051990484ffab317ee6d0

    SHA256

    034bdee780f2996c8963508cc02ef5952312641e8213008578ef8b0a0afca662

    SHA512

    1c6095f1b7ec11af97dd53f30409e4c5713dbf47ac427b04d98274d6a5ed20dec7cf8571f2d84d97885c54b7f0b52367722485a50dd2380216a03a40a5a49426

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\76561199811540174[1].htm

    Filesize

    34KB

    MD5

    07a727e6e2b625af4a825812368d35aa

    SHA1

    ea36a6ad35f18373d1c75af4af189a4034052faf

    SHA256

    454aa45fb6b230488ed0701b5401cd6f318ac3e49e843f768d7602b33fd4f32d

    SHA512

    2401b35409c5898ce5557831978d6fedf63bf8acd53ea5efa6b1a7169b0cfa42e7de6e12cd9f9c7794bed0704dce6f8b31ba8443b83408941be9e3424ea203f4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Cove

    Filesize

    1KB

    MD5

    9122dd9569f670eec7ebbf6e3f82dbb6

    SHA1

    e51023f22e57a74e763075203889550c1bbf58ec

    SHA256

    15a07938c97699e29ec5e8f445c0908bd05d6dc2775f3441e4e5adc990750c3d

    SHA512

    1db5d71d0685b005ca1a581bda0e3310b01c0c3e7fa94cb5ac194206f9fe8c9ab3cdc62b87705ee07dfa999688cc19fb14086ea6852be450959b9fffc823af58

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Covered

    Filesize

    14KB

    MD5

    0bc783cace1a35cd4cc40ee7bc62ac77

    SHA1

    1130608dca17e95add085aeda6a29875bc0f64fc

    SHA256

    1fb37eabf9823184fcef3668a393dbd144504aaf8b30726ca93d54bdf61454bd

    SHA512

    bcc088dcddae38ca788d98efe932490207529177298b080b2a94a2492f00577d67a5e58c7a12b53c6dab9977a1f840e2f537e8fcdecd6234b14f681eaa009b01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Distribution

    Filesize

    54KB

    MD5

    31489d22e7bb9b58cdc39b0eba0b1cfd

    SHA1

    36da026274c974a09f98137f66ad4e02d182f3fe

    SHA256

    cb34736346b96ff326141945aaf0997a3315885e62efef84e4ff313bc15f7282

    SHA512

    6428c37f795d19d4318fb14fbfe149d02a58e866b47098e1f6c5470487dee49caa57e9fac2a13d3a12e4f38237b8ffb2367b1d0dc0788b25383dfe5f8666bd42

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Expand

    Filesize

    139KB

    MD5

    378fe765d4aaff408e1d98e56cfeaeed

    SHA1

    027bdef8e373002d6ab62163d4230d7900f33bb2

    SHA256

    e32cff669c45141b12ef7eda50f2d072e8bb23e4c88302cee675ea8081875008

    SHA512

    ff1c4816b3f86db0463f6533a2c7f7a94feb847c6c40b5610dc338320b6015cf29089eb8a6706b42ebfac4eb112069fd6b9c6f8ed7f928535418a9fab20bbfc6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Family

    Filesize

    114KB

    MD5

    acf00c1a1d9db6abd4583b3fa2fc7558

    SHA1

    62ef98f3fcfe303f1a010b1b2b0eb17a8a665784

    SHA256

    a1031c5e7e0a8ab4c36ce6966fd377a8805282dc7ff65ac5cd53f573df771140

    SHA512

    7fa988bd6448fc7a42a553d139fc1c597e158e5b57b76c3a419bf54cdaab2885f417217dca0a2dedafc2a2b1dd2a7ee2e04bb11933c830d0a33b13e3b9814136

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Integration

    Filesize

    62KB

    MD5

    8e5ec279771ba19995c00f53540b079c

    SHA1

    e6390a49bdfd6924854c9ad397b0a42f09342b80

    SHA256

    9d1c2021c58cfc18757a581cf5c808ef480e165216a30713264f34aa13b6e0b6

    SHA512

    40a404c276398f9d537e8bee6af1d23dfa0081e36e512b565ee4feebaedde55d57a6e2254b9a332e3617cf54a3897ecee292725783b371d0221366a32cf9c446

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Interaction

    Filesize

    91KB

    MD5

    b8c1c4424956ee188fc9247501cf7921

    SHA1

    1ebfcbfdf4d9056dc737264323d53cb10c37c675

    SHA256

    98273dcc9c4eb60c41bf1ca656341f36093f04fe77d6a1e1d7cf8e2a8b652498

    SHA512

    62d6c214ecc9eda8c8f7a89b5a0c1de68420c5b28a029e74907959522be2ef4eb3224ad59f3f194ccace01b34efdb2c94dbb13fcdc662567ed24b1be09bcd706

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mature

    Filesize

    45KB

    MD5

    a2bb8d4f2a3ee080997a788cc103b87f

    SHA1

    13a8e94caf2fd67dcfde6864dc404fb976bcac5c

    SHA256

    a8376ec9d2f1186080cb1bce696a68f441c85e693dada2951e480d7f2299404d

    SHA512

    42358ff477e8000dd3a135794e5571e0e47f980a71c31350551054d6198a6c965959d17c98695217f658c8f929f76182e57fc41c94daa42cde72a77b52ea7330

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mint

    Filesize

    54KB

    MD5

    a227f5dc3dd714560ed55e3fc2f11fa3

    SHA1

    f9043080760e87dfdb4241384a747ca7966ee60a

    SHA256

    b0f979b9f9c756bedf6405d1e3415469a3392993b86714daa1bd1b24ba1994c4

    SHA512

    150e2bf645cfbdd16304e94a253b8e9873a705bf3b4a8d0ec28bc70093ea1977dd267bfe1b5b3217f2cb93ab24060d6bdc35f6fed53ac9361bcf848decd15a14

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mustang

    Filesize

    51KB

    MD5

    a46f68b6035443497d6dccd5727d602c

    SHA1

    91f772631ee771be854b31b0e77ca92d3b971182

    SHA256

    b4cb5542e90d313176e4720bcec1a254a747e1b50df75396cde173ceff303516

    SHA512

    95b47006139861d5f499df7bca36bd3baf3d6fc9f8a36ed8ecd67264efe48c21ad32b227480d3002ad748a910bd433590d714d505bbd20ef727b2be5db850309

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Oscar

    Filesize

    50KB

    MD5

    7e0a357e9cde9ee0874abe5137616a77

    SHA1

    3cbf55fef2fca0d4b7f3bf91beb45a8e9149a83f

    SHA256

    3afa6b4b2c2e75648ad5c3ad074d924848ec1cf1a6bedd25682126de839f64f6

    SHA512

    9c9a78ba5c3a3c46fff3d9f1c582c819a237af724d416a9aa43153d150f465d08dc73569d662d0b11f765f51116e55b6d78b28f6107f46352bf21533269dbc18

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Scenarios

    Filesize

    131KB

    MD5

    0ad6ae3c28e524a57dfffe4862889238

    SHA1

    a5d24c5e08a2fb71190b4b4b087461e7bbed813b

    SHA256

    68ce838bf53a770351ab5dc2ee858ea264e86035b225fa6a04eb9bfbbd985ce8

    SHA512

    5b823c5004743ac2a2c4876103d36a7000f6bf7973c5834d17eecedfe3b93ba65aef61cf76a1b0369ca905833d87261a8d5ae41447167701f809aa6ab0ee642f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Soa

    Filesize

    100KB

    MD5

    39a0cf811ba7442c91c418c9280cae58

    SHA1

    8f203c7fdd2de4a8b1d7e7aae1b619a906a54b62

    SHA256

    94a56a997ea6c295c0cb4121aa5ff04a7cad34fcb26afeac61baa0a64d911a6f

    SHA512

    7addd8854a3ea0b660b9951614f88a188e6a37541b380d12ff17f327141a7e17992bc7588e3d08ce22e32666122d3d03a85315640d94ab136367ef9c681a1292

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Spaces

    Filesize

    479KB

    MD5

    02ed51e9343b4d9d3eb4706a5561ef93

    SHA1

    cff16b86ee1126ade645398cc4d5b66879f212e2

    SHA256

    6e3e6d7a923852ae7b7ac09d81d58436e9fb07980d2f6b87bf4e991b59fc9e45

    SHA512

    d5533c177510734419e09b4fa70f22ddbf8c881b09c073a15708d6652f0ec215c38236d6dbe0cbc4dbe9500c5ab6389e77be481deb2962a794654b14d34d9e0b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Statistics

    Filesize

    54KB

    MD5

    972f43da70f545b0e2c1dc7a2b2931e1

    SHA1

    8e33920dd7676fbb7359ad74e04f2c7490df3927

    SHA256

    e1438f231a903bccc90cb4b988870bb1c86a291b3b20432bbb0fc7a2803e1d4f

    SHA512

    256ecb01a58185d6104e3b8ed4139f060cf64fbd549f206dd95987e9fe524023bbbc9a058e82f3faef98ac1bae1555ecbd0eff3df2ac7a2b645a5d823640c301

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sustainability

    Filesize

    63KB

    MD5

    68e1d4f224ecfca6b0dc77de19699423

    SHA1

    6d8eaac394646c9e520ace23e9c10c7707f980ef

    SHA256

    526c3d48ff1f8daa13ab206784420110cb6884f1796df5583ceb3aa454464247

    SHA512

    01bac36f9a05583f9b98da45742756da3a228ad61af3190d7a1626da946fba990f7cb884a3bb04fc8b7b4bc0472d59f462ec501bddf40615a3760ee7d552d416

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tri

    Filesize

    75KB

    MD5

    f857d99f97fc3586dc66fc7eb61e59c3

    SHA1

    772a11da84aaf3776f65851b18a90fae9f951c9f

    SHA256

    52e43aa1c3ce447317f2e914edad52de9354ae491bf078cb807cd1a9be9ae4a9

    SHA512

    d01f1ebef8c6bceadf543df03ded51dd8e91e02d3dd716d2a22799ad562631b58733a8cbe5772b1d2e16fb30282a12eabcc197669b50edd779cd35e3e0ffe1c6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Valuation

    Filesize

    63KB

    MD5

    dddfadc8e277400f72cf5aee39940c0c

    SHA1

    934e58dc098838eca03054395c86cac84ac65561

    SHA256

    66fbbb4228346ad72b2fd62f1aa9228bdea3e7253998d44a248862ae323c8a6d

    SHA512

    0838de156b62f6df3d2afecf4e5164cbefecd96ad047d5d7eb3170c6e0a3ff44f8240880755af2132c1243cd3b870bf72c200b2ac5771e53cf046c2065cf3383

  • C:\Users\Admin\AppData\Local\Temp\Cab7689.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar76BB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1120-78-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB

  • memory/1120-81-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB

  • memory/1120-82-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB

  • memory/1120-80-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB

  • memory/1120-79-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB

  • memory/1120-77-0x0000000003610000-0x0000000003896000-memory.dmp

    Filesize

    2.5MB