Resubmissions

19-02-2024 21:13

240219-z2w1ssdh29 9

19-02-2024 21:12

240219-z2bpvsdg95 9

19-02-2024 21:11

240219-z1vfksdc6y 9

19-02-2024 21:09

240219-zzp5gadc4y 9

19-02-2024 21:05

240219-zxln9sdg37 9

19-02-2024 21:03

240219-zv5dladf97 10

Analysis

  • max time kernel
    1190s
  • max time network
    875s
  • platform
    windows10-1703_x64
  • resource
    win10-20240214-en
  • resource tags

    arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-02-2024 21:12

General

  • Target

    Vaper4.exe

  • Size

    10.6MB

  • MD5

    50faefd96a3884a0bd06b4c67d53629f

  • SHA1

    c4445a81135f380d2316b4eee2350b537cbcc364

  • SHA256

    cfa8e745a7570804047bc0b20accc699960fb77dfa659e9031355088ffb00c33

  • SHA512

    0ac25c158ccd0914d0fe115c032eb514e0a789debbb0b6691514df43cfb8d3485b4171cef4ed0710627ae5683c704684d3011981eeff5ebb2625140c00b62b5f

  • SSDEEP

    196608:6RQz0r8ovtaMDiekfc92f6NvRXACKit/YJPw71p/8:6s0r8o1aMWPfbiSwj/8

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vaper4.exe
    "C:\Users\Admin\AppData\Local\Temp\Vaper4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-1-0x00007FFADFAB0000-0x00007FFADFC8B000-memory.dmp

    Filesize

    1.9MB

  • memory/4760-0-0x00007FF77C850000-0x00007FF77DBC6000-memory.dmp

    Filesize

    19.5MB

  • memory/4760-2-0x00007FF77C850000-0x00007FF77DBC6000-memory.dmp

    Filesize

    19.5MB

  • memory/4760-3-0x00007FF77C850000-0x00007FF77DBC6000-memory.dmp

    Filesize

    19.5MB

  • memory/4760-4-0x00007FF77C850000-0x00007FF77DBC6000-memory.dmp

    Filesize

    19.5MB

  • memory/4760-5-0x00007FF77C850000-0x00007FF77DBC6000-memory.dmp

    Filesize

    19.5MB

  • memory/4760-7-0x00007FFADFAB0000-0x00007FFADFC8B000-memory.dmp

    Filesize

    1.9MB