| File name: | lem.exe |
| Full analysis: | https://app.any.run/tasks/d5fa8e13-fb5b-4562-8392-46dbd7c38298 |
| Verdict: | Malicious activity |
| Threats: | Vidar is a dangerous malware that steals information and cryptocurrency from infected users. It derives its name from the ancient Scandinavian god of Vengeance. This stealer has been terrorizing the internet since 2018. |
| Analysis date: | August 20, 2024, 13:48:15 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
| MD5: | 480CC345F96293237F33FDC8261E1F87 |
| SHA1: | 981E17E7DC02AA6EE2CA014920151F5B73A3FE70 |
| SHA256: | 639A5217E18588E928816A64491589D085456FADF5D6F9A5B0DA7B5B0D7FBA9D |
| SSDEEP: | 49152:P5bzHf0RiXqZFFYfoHcQqF6EBZEPeFpIwGYokD6m9FQ5VoSnpUeExLLuaRPtyzq3:BbzfzQFFmoHcVFJGebIwxdD2VoSnpMHP |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:04:10 12:19:38+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 26624 |
| InitializedDataSize: | 475136 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x3415 |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.2184.7.9734 |
| ProductVersionNumber: | 0.2184.7.9734 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | Pixel art creation software with advanced editing features. |
| CompanyName: | ArtPixel360 Innovations Co. |
| FileDescription: | Pixel art creation software with advanced editing features. |
| FileVersion: | 0.2184.7.9734 |
| LegalCopyright: | Copyright © ArtPixel360 Innovations Co. 2019 All rights reserved. |
| LegalTrademarks: | PixelArtX360 is a trademark of ArtPixel360 Innovations Co. |
| ProductName: | PixelArtX360 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1688 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4692 | findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5116 | Uc.pif i | C:\Users\admin\AppData\Local\Temp\17221\Uc.pif | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script Version: 3, 3, 14, 5 Modules
Vidar(PID) Process(5116) Uc.pif C2https://t.me/iyigunl URLhttps://steamcommunity.com/profiles/76561199761128941 Strings (239)INSERT_KEY_HERE lstrcpyA GetEnvironmentVariableA GdipSaveImageToStream History runas ssfn* GetProcAddress lstrcatA OpenEventA CloseHandle Sleep GetUserDefaultLangID VirtualAllocExNuma VirtualFree GetSystemInfo HeapAlloc GetComputerNameA GetProcessHeap GetCurrentProcess lstrlenA ExitProcess GlobalMemoryStatusEx GetSystemTime SystemTimeToFileTime gdi32.dll user32.dll crypt32.dll ntdll.dll CreateDCA GetDeviceCaps ReleaseDC CryptStringToBinaryA sscanf NtQueryInformationProcess HAL9TH JohnDoe DISPLAY %hu/%hu/%hu GetFileAttributesA GlobalLock GlobalSize CreateToolhelp32Snapshot IsWow64Process Process32Next GetLocalTime GetTimeZoneInformation GetSystemPowerStatus GetVolumeInformationA Process32First GetLocaleInfoA GetUserDefaultLocaleName GetModuleFileNameA FindNextFileA SetEnvironmentVariableA LocalAlloc GetFileSizeEx SetFilePointer FindFirstFileA VirtualProtect GetLogicalProcessorInformationEx GetLastError MultiByteToWideChar GlobalFree WideCharToMultiByte TerminateProcess GetCurrentProcessId rstrtmgr.dll CreateCompatibleBitmap SelectObject BitBlt DeleteObject CreateCompatibleDC GdipGetImageEncodersSize GdipGetImageEncoders GdipCreateBitmapFromHBITMA GdiplusStartup GdiplusShutdown GdipDisposeImage GetHGlobalFromStream CreateStreamOnHGlobal CoUninitialize CoInitialize CoCreateInstance BCryptGenerateSymmetricKey BCryptCloseAlgorithmProvider BCryptDecrypt BCryptSetProperty BCryptDestroyKey BCryptOpenAlgorithmProvider GetWindowRect GetDesktopWindow GetDC EnumDisplayDevicesA GetKeyboardLayoutList CharToOemW RegQueryValueExA RegEnumKeyExA RegOpenKeyExA RegEnumValueA CryptBinaryToStringA CryptUnprotectData SHGetFolderPathA InternetOpenUrlA InternetConnectA InternetCloseHandle InternetOpenA HttpSendRequestA HttpOpenRequestA InternetReadFile InternetCrackUrlA StrStrA PathMatchSpecA GetModuleFileNameExA RmStartSession RmRegisterResources RmEndSession sqlite3_open sqlite3_prepare_v2 sqlite3_step sqlite3_column_text sqlite3_finalize sqlite3_close sqlite3_column_bytes sqlite3_column_blob encrypted_key PATH C:\ProgramData\nss3.dll NSS_Shutdown PK11_GetInternalKeySlot PK11_FreeSlot PK11_Authenticate PK11SDR_Decrypt C:\ProgramData\ SELECT origin_url, username_value, password_value FROM logins Soft: Host: Login: Password: Opera OperaGX Network Cookies .txt TRUE FALSE SELECT name, value FROM autofill History SELECT url FROM urls LIMIT 1000 CC SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards Name: Month: Year: Card: Cookies Login Data formSubmitURL usernameField encryptedUsername encryptedPassword guid SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT fieldname, value FROM moz_formhistory SELECT url FROM moz_places LIMIT 1000 cookies.sqlite formhistory.sqlite places.sqlite Plugins Local Extension Settings Sync Extension Settings Opera Stable Opera GX Stable CURRENT chrome-extension_ _0.indexeddb.leveldb profiles.ini chrome opera firefox Wallets %08lX%04lX%lu SOFTWARE\Microsoft\Windows NT\CurrentVersion x64 %d/%d/%d %d:%d:%d HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall DisplayVersion msvcp140.dll softokn3.dll vcruntime140.dll \Temp\ .exe open %LOCALAPPDATA% %USERPROFILE% %PROGRAMFILES% %PROGRAMFILES_86% *.lnk Files \Local Storage\leveldb\CURRENT \Local Storage\leveldb \Telegram Desktop\ D877F783D5D3EF8C* map* A7FDF864FBC10B77* A92DAA6EA6F891F2* F8806DD0C461824F* Tox *.tox *.ini Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375 Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ \Outlook\accounts.txt Pidgin accounts.xml token: Software\Valve\Steam config.vdf DialogConfig.vdf DialogConfigOverlay*.vdf libraryfolders.vdf loginusers.vdf \Steam\ \Discord\tokens.txt /c timeout /t 5 & del /f /q " " & del "C:\ProgramData\*.dll"" & exit C:\Windows\system32\cmd.exe Content-Type: multipart/form-data; boundary=---- Content-Disposition: form-data; name=" build token message ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 screenshot.jpg (PID) Process(5116) Uc.pif C2https://t.me/iyigunl URLhttps://steamcommunity.com/profiles/76561199761128941 | |||||||||||||||
| 6056 | choice /d y /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6508 | cmd /c copy /b ..\Trademark + ..\Producer + ..\Patterns + ..\Trials + ..\Albany + ..\Jackson i | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6520 | findstr /V "bonesacersystemplaying" Cream | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6528 | cmd /c md 17221 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6672 | "C:\Users\admin\Desktop\lem.exe" | C:\Users\admin\Desktop\lem.exe | — | explorer.exe | |||||||||||
User: admin Company: ArtPixel360 Innovations Co. Integrity Level: MEDIUM Description: Pixel art creation software with advanced editing features. Exit code: 0 Version: 0.2184.7.9734 Modules
| |||||||||||||||
| 6712 | "C:\Windows\System32\cmd.exe" /k move Pray Pray.cmd & Pray.cmd & exit | C:\Windows\SysWOW64\cmd.exe | lem.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 9009 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6724 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER |
| Operation: | delete value | Name: | BowHardcore |
Value: | |||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER |
| Operation: | delete value | Name: | PaperbacksCambodia |
Value: | |||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (6672) lem.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Pray | text | |
MD5:F1FD3C7220FACF470B996A9379190113 | SHA256:34ECED43FE6CD76E5B6ACDF44AF4DEC89AB1D077D14E3D14D70E7CA1ECBCDC0E | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Trials | binary | |
MD5:24CF38486E24605222EDF6FCF8CFF6E8 | SHA256:A0F013172D123432D09D895355A1478783308468615261312D91F99C662663DF | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Cream | binary | |
MD5:9214610A5B73E1B10F4E6E06A2BA2432 | SHA256:FFD3C52E488062B4F11DF0B8A7A3FAC58C66FC34207AFE0BAE1C660FF5E51A0D | |||
| 5116 | Uc.pif | C:\Users\admin\AppData\Local\Temp\delays.tmp | text | |
MD5:275C8C499B12CEC09D8718B16E3FD329 | SHA256:97C693F204221532D7CBBC57D477774A155E1FABA10CDF312E6D0422D1DEA97C | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Producer | binary | |
MD5:7E7607AE2A5B15272504D9113D0DAA05 | SHA256:45B07AE181FFCDF6E4C1A69D59798E38172F028DEEDA2849F5C115D9C127356F | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Albany | binary | |
MD5:EB88F93AF4EB225F8B39EA60405098B1 | SHA256:C3712F8BF559A493F16E58DBFA06E02BDA63E04731AF85ECABC9FB417A9A86E2 | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Trademark | binary | |
MD5:BD964B18DF227902A7A616EAC33DC230 | SHA256:3424C9E85A4FCAED1911C6164E559C2E2A1AAD3B32AD9153DAF9380AE8CAA6CE | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Jackson | binary | |
MD5:33CCC90C0137E8BBDA9BA32F554AAE10 | SHA256:2C2D4A66E8BA5D0F634426AD2BAA1C204D9C3A4639F186DDFFB44B2426633200 | |||
| 6672 | lem.exe | C:\Users\admin\AppData\Local\Temp\Patterns | binary | |
MD5:0B93429A8CE125DD69E92E0AA6DCE16A | SHA256:7C0127A038DBAC9CE2AEEB436A24ED031506D7719FD096A075706C5ACD55BD43 | |||
| 6712 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Pray.cmd | text | |
MD5:F1FD3C7220FACF470B996A9379190113 | SHA256:34ECED43FE6CD76E5B6ACDF44AF4DEC89AB1D077D14E3D14D70E7CA1ECBCDC0E | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1432 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2252 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1432 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4324 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1432 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
DhKHpuUtSSXxLJFtoyCtewjr.DhKHpuUtSSXxLJFtoyCtewjr |
| unknown |