Edit tour
Windows
Analysis Report
xoJxSAotVM.exe
Overview
General Information
Sample name: | xoJxSAotVM.exerenamed because original name is a hash value |
Original sample name: | 135436f1ae4e69f5098f8e74e3106863.exe |
Analysis ID: | 1568173 |
MD5: | 135436f1ae4e69f5098f8e74e3106863 |
SHA1: | 789cb8efbd9dc5ca1d31acdf22976f46ebbd057b |
SHA256: | 4535fab33b0df6f1864368f8736efb83d7d6a7db0a09b11e3d40c8b65b7d5428 |
Tags: | exeuser-smica83 |
Infos: | |
Detection
Vidar
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for dropped file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected Vidar stealer
AI detected suspicious sample
Adds extensions / path to Windows Defender exclusion list
Drops PE files with a suspicious file extension
Loading BitLocker PowerShell Module
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Classification
- System is w10x64
- xoJxSAotVM.exe (PID: 7680 cmdline:
"C:\Users\ user\Deskt op\xoJxSAo tVM.exe" MD5: 135436F1AE4E69F5098F8E74E3106863) - powershell.exe (PID: 7696 cmdline:
"powershel l.exe" -C "Set-MpPre ference -E xclusionPa th C:\\" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7704 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 7900 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - cmd.exe (PID: 7976 cmdline:
"cmd.exe" /C C:\Prog ramData\di n.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - din.exe (PID: 8024 cmdline:
C:\Program Data\din.e xe MD5: E3ADDF3612513EBE5830CD5C7C6F0E22) - cmd.exe (PID: 8068 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Go ne Gone.cm d && Gone. cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8076 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 8140 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 8172 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 8188 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7028 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7284 cmdline:
cmd /c md 112974 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 7328 cmdline:
findstr /V "Applianc eFellowshi pWhileRegi stry" Beve rly MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7376 cmdline:
cmd /c cop y /b ..\Bu lgarian + ..\Apply + ..\Legs + ..\Rules + ..\Vat + ..\July + ..\Gamma + ..\Geogr aphic r MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Decade.com (PID: 7368 cmdline:
Decade.com r MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11) - chrome.exe (PID: 7420 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 7284 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2596 --fi eld-trial- handle=256 4,i,113024 4227476948 5425,11436 4890299419 99890,2621 44 /prefet ch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - choice.exe (PID: 7432 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- svchost.exe (PID: 8000 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:16:04.837362+0100 | 2019714 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 5.101.153.57 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:17:13.216477+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 159.69.102.165 | 443 | 192.168.2.4 | 49768 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:17:15.512266+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 159.69.102.165 | 443 | 192.168.2.4 | 49774 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-04T12:17:10.915098+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.4 | 49762 | 159.69.102.165 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 0_2_00007FF6B1A056C0 | |
Source: | Code function: | 0_2_00007FF6B1981770 | |
Source: | Code function: | 0_2_00007FF6B1983E60 | |
Source: | Code function: | 0_2_00007FF6B18D7E90 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF6B19B0A00 | |
Source: | Code function: | 6_2_00406301 | |
Source: | Code function: | 6_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |