Windows
Analysis Report
SwitchAutoSetup_v0.7.0.3.exe
Overview
General Information
Detection
Vidar
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Attempt to bypass Chrome Application-Bound Encryption
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Vidar stealer
Found many strings related to Crypto-Wallets (likely being stolen)
Searches for specific processes (likely to inject)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Browser Started with Remote Debugging
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Yara detected Credential Stealer
Classification
- System is w10x64
SwitchAutoSetup_v0.7.0.3.exe (PID: 7360 cmdline:
"C:\Users\ user\Deskt op\SwitchA utoSetup_v 0.7.0.3.ex e" MD5: 4CE764CCCF817C7F6F527E8D2C69C7E6) SwitchAutoSetup_v0.7.0.3.tmp (PID: 7376 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-P16 Q6.tmp\Swi tchAutoSet up_v0.7.0. 3.tmp" /SL 5="$2043C, 22688416,7 81824,C:\U sers\user\ Desktop\Sw itchAutoSe tup_v0.7.0 .3.exe" MD5: 936F45C3C0CFC53736EBA6F1D614855E) SwitchAutoSetup_v0.7.0.3.exe (PID: 7412 cmdline:
"C:\Users\ user\Deskt op\SwitchA utoSetup_v 0.7.0.3.ex e" /VERYSI LENT MD5: 4CE764CCCF817C7F6F527E8D2C69C7E6) SwitchAutoSetup_v0.7.0.3.tmp (PID: 7436 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\is-7PC 5R.tmp\Swi tchAutoSet up_v0.7.0. 3.tmp" /SL 5="$20446, 22688416,7 81824,C:\U sers\user\ Desktop\Sw itchAutoSe tup_v0.7.0 .3.exe" /V ERYSILENT MD5: 936F45C3C0CFC53736EBA6F1D614855E) SystemScannerSetup.exe (PID: 7612 cmdline:
"C:\Users\ user\AppDa ta\Roaming \{A7F7D5A3 -B325-4F57 -929C-68BC 253DBE9A}\ SystemScan nerSetup.e xe" MD5: 810FE193D35FE0D6577E9E3455F70579) chrome.exe (PID: 2964 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --re mote-debug ging-port= 9223 --pro file-direc tory="Defa ult" MD5: E81F54E6C1129887AEA47E7D092680BF) chrome.exe (PID: 1400 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --no-pre-r ead-main-d ll --field -trial-han dle=2436,i ,723012272 3258020460 ,165033105 0637325766 6,262144 - -variation s-seed-ver sion=20250 306-183004 .429000 -- mojo-platf orm-channe l-handle=2 508 /prefe tch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
Source: | Author: pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:08:57.306498+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 95.217.31.199 | 443 | 192.168.2.4 | 49726 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:09:00.232279+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 95.217.31.199 | 443 | 192.168.2.4 | 49727 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:08:57.305888+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.4 | 49726 | 95.217.31.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:09:03.166295+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49728 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:05.007865+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49729 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:05.028479+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:07.243377+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49731 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:09.191933+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:18.356626+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:19.327027+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:20.414967+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:21.398133+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:26.326106+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:26.868257+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49761 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:30.809307+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:32.163775+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:53.325811+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:54.066993+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49767 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:57.096435+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:58.211213+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:00.449365+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:01.351689+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:04.775588+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49772 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:05.531328+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49773 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:09.168484+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49774 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:10.550196+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49775 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:13.099011+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:14.224361+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:18.008369+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:10:20.078642+0100 | 2059331 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 95.217.31.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:09:05.028479+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49730 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:07.243377+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49731 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:09.191933+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:20.414967+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:21.398133+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:26.326106+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:26.868257+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49761 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:30.809307+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 95.217.31.199 | 443 | TCP |
2025-03-08T14:09:32.163775+0100 | 2859636 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 95.217.31.199 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-08T14:08:51.224057+0100 | 2859378 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49724 | 95.217.31.199 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Code function: | 5_2_00986A10 | |
Source: | Code function: | 5_2_00990830 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 5_2_00402910 | |
Source: | Code function: | 5_2_004069DF | |
Source: | Code function: | 5_2_00405D8E | |
Source: | Code function: | 5_2_0098B6B0 | |
Source: | Code function: | 5_2_00987210 | |
Source: | Code function: | 5_2_00993580 | |
Source: | Code function: | 5_2_009897B0 | |
Source: | Code function: | 5_2_009813F0 | |
Source: | Code function: | 5_2_00988360 | |
Source: | Code function: | 5_2_00988C90 | |
Source: | Code function: | 5_2_00995EB0 | |
Source: | Code function: | 5_2_0098ACD0 | |
Source: | Code function: | 5_2_00994E70 | |
Source: | Code function: | 5_2_00993FD0 | |
Source: | Code function: | 5_2_00994950 |
Source: | Code function: | 5_2_00993AF0 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 5_2_00982690 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |