Resubmissions
16-08-2021 11:47
210816-rdppjts4ax 909-07-2021 17:22
210709-kqt43n2hz6 1009-07-2021 17:14
210709-h55grz443x 9Analysis
-
max time kernel
300s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
09-07-2021 17:22
Static task
static1
Behavioral task
behavioral1
Sample
Vape V4.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Vape V4.exe
Resource
win10v20210408
General
-
Target
Vape V4.exe
-
Size
42KB
-
MD5
919b60c62ed64aa128f5a73f4c1a4b4f
-
SHA1
23178189e308ca9e814caa2cad4ddf472e726b3f
-
SHA256
050e1b254473b7bbb2214fe09aa93f2dc01793331106edb7f03fc834ca0a6b17
-
SHA512
37941898baa7353e63b0934d80a931746bdfe5219e2972eec6dc6c05057ec420489331cf8313be21df69bb8e0f3f8a58279c27d458d241ba225e169e027d0817
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Vape V4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Vape V4.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Vape V4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Vape V4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 Vape V4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1512 1400 WerFault.exe Vape V4.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Vape V4.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S Vape V4.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Vape V4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation Vape V4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer Vape V4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName Vape V4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 Vape V4.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Vape V4.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1400 Vape V4.exe Token: SeDebugPrivilege 1512 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vape V4.exe"C:\Users\Admin\AppData\Local\Temp\Vape V4.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1400 -s 21442⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-