Analysis

  • max time kernel
    1768s
  • max time network
    1162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2023, 17:23

General

  • Target

    vapelite.exe

  • Size

    10.3MB

  • MD5

    8013813bf8912204ce106b58e70ccf2d

  • SHA1

    29ce31f65c3fd9f1423ee66a5aef01a0b9a587eb

  • SHA256

    61cb3f360c6ff0678cfffec47afcdcfa6484ee370f94e2c2dad19b8d7bb03f6f

  • SHA512

    8dce5530a0d958bf92fc634bbd0536c65934ec463c0ff038bebe74e0efd4a3a76a736f4e1aa6629273249cf7a0b801e0f89eec9f4b602e7270cbed49b8569b90

  • SSDEEP

    196608:95088ebS5/l6msgYhiTxPLDV4L2UqPG+4IOP34Fsfk/9Q6:95088ebW/l6dg+2PnoqqIOPjO9Q6

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vapelite.exe
    "C:\Users\Admin\AppData\Local\Temp\vapelite.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:64

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/64-0-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-2-0x00007FFE16850000-0x00007FFE16A45000-memory.dmp

          Filesize

          2.0MB

        • memory/64-1-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-3-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-4-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-5-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-6-0x00007FF775780000-0x00007FF776AAE000-memory.dmp

          Filesize

          19.2MB

        • memory/64-7-0x00007FFE16850000-0x00007FFE16A45000-memory.dmp

          Filesize

          2.0MB

        • memory/64-9-0x00007FFE16850000-0x00007FFE16A45000-memory.dmp

          Filesize

          2.0MB