Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12/02/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
Vape V4.exe
Resource
win7-20221111-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Vape V4.exe
-
Size
10.3MB
-
MD5
6d95d57ef500347220f621638ff965b4
-
SHA1
f9de78f2057ec6686e5d130a8e18f74d8dd8ddfa
-
SHA256
8a9c06daa59ab171f603ee22832628b4d5706e91177e8ed9087d228b56d56e4a
-
SHA512
6990a0ce3caa5b25c3ab7beeb20ad6b72cd856994cdaf8ea3ec28c6d7636d26fcdf4a53be052a05649201b0a0b34f7b0ddc3698c772894a3f72f94d0dace708f
-
SSDEEP
196608:Vq90E03c2oRgf06qkYrToXqMGekJUHziRvHSiehVAWFQ:Vq90E03DoRsHco6SexHSbrS
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Vape V4.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Vape V4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Vape V4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Vape V4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1912 Vape V4.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1912 Vape V4.exe Token: SeDebugPrivilege 1912 Vape V4.exe Token: 33 1496 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1496 AUDIODG.EXE Token: 33 1496 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1496 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vape V4.exe"C:\Users\Admin\AppData\Local\Temp\Vape V4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1444
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1948