Resubmissions
15-02-2025 17:48
250215-wdrvdswkfp 1015-02-2025 17:45
250215-wbsnxawnav 1014-02-2025 17:46
250214-wcq7gawkgz 1006-02-2025 16:53
250206-vec7yssnfk 10Analysis
-
max time kernel
53s -
max time network
61s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-02-2025 17:26
Static task
static1
Behavioral task
behavioral1
Sample
SidMeiersCivilizationVII.zip
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
Sid Meier's Civilization VII.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
Sid Meier's Civilization VII.exe
-
Size
683.9MB
-
MD5
3f40339bdf295a6f099dd097433c51c2
-
SHA1
54cbfa3105a4fb6c59d699083edad98b706bbad0
-
SHA256
48318511e386734e3540bf6898631d97a52ff3428dfb5eea001c218a133ca4ac
-
SHA512
88d08f9a59b922e34d24e1068debc37ff743585c3d8267c539d189b81d255e5fc6cae5ac27075a20719616623975d033ce425b153b9df5a8359698adff99273e
-
SSDEEP
98304:loE8pTFYNxOkXbP9RezM6XDkOt+tH8MQ/sksDYAFpU0jyak4/JjCc1:lhSGV63sNDV40fjC0
Malware Config
Extracted
vidar
https://t.me/cruadsummar
https://t.me/pullmeundervosk2
Signatures
-
Detect Vidar Stealer 16 IoCs
resource yara_rule behavioral2/memory/6052-5-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-1-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-9-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-10-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-11-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-12-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-13-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-47-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-49-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-50-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-51-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-52-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-53-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-54-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-55-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 behavioral2/memory/6052-56-0x0000000000340000-0x0000000000362000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5076 chrome.exe 2884 chrome.exe 828 chrome.exe 4652 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3852 set thread context of 6052 3852 Sid Meier's Civilization VII.exe 86 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sid Meier's Civilization VII.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133845462570398206" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6052 BitLockerToGo.exe 6052 BitLockerToGo.exe 6052 BitLockerToGo.exe 6052 BitLockerToGo.exe 828 chrome.exe 828 chrome.exe 6052 BitLockerToGo.exe 6052 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 828 chrome.exe 828 chrome.exe 828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe Token: SeShutdownPrivilege 828 chrome.exe Token: SeCreatePagefilePrivilege 828 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe 828 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 3852 wrote to memory of 6052 3852 Sid Meier's Civilization VII.exe 86 PID 6052 wrote to memory of 828 6052 BitLockerToGo.exe 87 PID 6052 wrote to memory of 828 6052 BitLockerToGo.exe 87 PID 828 wrote to memory of 4484 828 chrome.exe 88 PID 828 wrote to memory of 4484 828 chrome.exe 88 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 2188 828 chrome.exe 89 PID 828 wrote to memory of 4300 828 chrome.exe 90 PID 828 wrote to memory of 4300 828 chrome.exe 90 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91 PID 828 wrote to memory of 420 828 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sid Meier's Civilization VII.exe"C:\Users\Admin\AppData\Local\Temp\Sid Meier's Civilization VII.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7fff3ca9cc40,0x7fff3ca9cc4c,0x7fff3ca9cc584⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1952 /prefetch:24⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2216 /prefetch:34⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2288 /prefetch:84⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:14⤵
- Uses browser remote debugging
PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3384 /prefetch:14⤵
- Uses browser remote debugging
PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4356 /prefetch:14⤵
- Uses browser remote debugging
PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:84⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4856 /prefetch:84⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4984,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:84⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,4997338105256017867,5635569932123562535,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4684 /prefetch:84⤵PID:4104
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af