Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 21:35
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe
-
Size
5.7MB
-
MD5
e75ea1fd0fb29383b2f4822022ddf34c
-
SHA1
c30e9c9b52b5394b591bfb40b13ef594ccedf316
-
SHA256
f9a8f7bfe93aff2b25c733f46a9a5a7cbf366cb12cdee3a1262f1f737ea5204f
-
SHA512
5662eebaf91c295aa56409e307ad09b47828b7e8986d906fa7e0d0b0aaba8008d6a0227bd8e770fe1138b75059e5c0505e66dc35685f07ed401ce2c462f77ce1
-
SSDEEP
49152:uYyT7q1dtjhwEM2wM1CRxMzIouecTPycvms1WmZURWBZQApOsmeW7LD/OI0x1DPS:1m7K7jNM2qazuycJ0X2T
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Signatures
-
Detect Vidar Stealer 12 IoCs
resource yara_rule behavioral2/memory/1904-1-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-2-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-3-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-4-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-5-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-6-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-40-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-42-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-43-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-46-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-50-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1904-51-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4604 chrome.exe 4656 chrome.exe 3148 chrome.exe 3352 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844745761536680" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1904 BitLockerToGo.exe 1904 BitLockerToGo.exe 1904 BitLockerToGo.exe 1904 BitLockerToGo.exe 4656 chrome.exe 4656 chrome.exe 1904 BitLockerToGo.exe 1904 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 2596 wrote to memory of 1904 2596 2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe 93 PID 1904 wrote to memory of 4656 1904 BitLockerToGo.exe 94 PID 1904 wrote to memory of 4656 1904 BitLockerToGo.exe 94 PID 4656 wrote to memory of 1812 4656 chrome.exe 95 PID 4656 wrote to memory of 1812 4656 chrome.exe 95 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 2840 4656 chrome.exe 96 PID 4656 wrote to memory of 3628 4656 chrome.exe 97 PID 4656 wrote to memory of 3628 4656 chrome.exe 97 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98 PID 4656 wrote to memory of 768 4656 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-19_e75ea1fd0fb29383b2f4822022ddf34c_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd9852cc40,0x7ffd9852cc4c,0x7ffd9852cc584⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1968 /prefetch:24⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2004 /prefetch:34⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2256 /prefetch:84⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:14⤵
- Uses browser remote debugging
PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3344 /prefetch:14⤵
- Uses browser remote debugging
PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4252,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3648 /prefetch:84⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4676 /prefetch:14⤵
- Uses browser remote debugging
PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4632,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4620 /prefetch:84⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4924 /prefetch:84⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4996,i,14033152628272747962,17639020276751893809,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:84⤵PID:2404
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af