Overview
overview
7Static
static
3vape/Bape Client.lnk
windows7-x64
vape/Bape Client.lnk
windows10-2004-x64
7vape/Vape4DLL.dll
windows7-x64
1vape/Vape4DLL.dll
windows10-2004-x64
1vape/bapeclient.bat
windows7-x64
1vape/bapeclient.bat
windows10-2004-x64
1vape/vape-loader.jar
windows7-x64
1vape/vape-loader.jar
windows10-2004-x64
7Analysis
-
max time kernel
143s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
vape/Bape Client.lnk
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
vape/Bape Client.lnk
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
vape/Vape4DLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
vape/Vape4DLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
vape/bapeclient.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
vape/bapeclient.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
vape/vape-loader.jar
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
vape/vape-loader.jar
Resource
win10v2004-20240412-en
General
-
Target
vape/Bape Client.lnk
-
Size
2KB
-
MD5
23950592e0740b83a3e7215eab5c68f7
-
SHA1
9b2cbb9af9f8f9df2ca263eaed5c9daa914a8e35
-
SHA256
c48b1a33148396e0eb504639e773a933c7fe4330842dad606edbca183881b41f
-
SHA512
2304489ad6c8e7add39b8144d8e2b86c3f5a124383f8903122a8280664cae55f123889ee52ae28458c72758df037c2d0a3d8e9213e40b5a250bff36e70386e91
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3708 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1324 wrote to memory of 412 1324 cmd.exe 86 PID 1324 wrote to memory of 412 1324 cmd.exe 86 PID 412 wrote to memory of 1692 412 cmd.exe 88 PID 412 wrote to memory of 1692 412 cmd.exe 88 PID 412 wrote to memory of 3708 412 cmd.exe 90 PID 412 wrote to memory of 3708 412 cmd.exe 90 PID 412 wrote to memory of 4936 412 cmd.exe 96 PID 412 wrote to memory of 4936 412 cmd.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\vape\Bape Client.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vape\bapeclient.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\mode.commode 55, 93⤵PID:1692
-
-
C:\Windows\system32\PING.EXEping localhost -n 5.53⤵
- Runs ping.exe
PID:3708
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava --add-opens java.base/java.lang=ALL-UNNAMED -jar vape-loader.jar3⤵PID:4936
-
-