Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 01:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Vape v4.10.rar
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Vape v4.10.rar
Resource
win10v2004-20240412-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
Vape v4.10.rar
-
Size
17.5MB
-
MD5
94225360f6c43806154028b59d6fcd7e
-
SHA1
c833f9e216bb703ab8db48492420d4119485fac1
-
SHA256
d97404002e0dc33afd30404a4462706b9892d82161c47d5b6ac57b4f0c397526
-
SHA512
b0ea74d4cd45ff35303751df937ea2fc0209d317bb9e0813cf26db7ecd4ea8d8cea13e428b18859bf5495108f3de6f1eb9529e4eadc71814c4de29c58b47fe67
-
SSDEEP
393216:sSWGYXyOJzz617iGtDmm67eSspjsP7yKbaPajSFxY:hWGhOpWdp67l9baijay
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2608 7zFM.exe Token: 35 2608 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2608 1700 cmd.exe 29 PID 1700 wrote to memory of 2608 1700 cmd.exe 29 PID 1700 wrote to memory of 2608 1700 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Vape v4.10.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Vape v4.10.rar"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2608
-