Analysis

  • max time kernel
    55s
  • max time network
    45s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/07/2024, 19:47

General

  • Target

    https://dosya.co/dm5rpkjlbxzk/VAPEV4.10.exe.html

Score
9/10

Malware Config

Signatures

  • Nirsoft 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://dosya.co/dm5rpkjlbxzk/VAPEV4.10.exe.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffab44c9758,0x7ffab44c9768,0x7ffab44c9778
      2⤵
        PID:1320
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:2
        2⤵
          PID:924
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
          2⤵
            PID:368
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
            2⤵
              PID:3368
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:1
              2⤵
                PID:4780
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:1
                2⤵
                  PID:1956
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:1
                  2⤵
                    PID:2192
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4764 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:1
                    2⤵
                      PID:392
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                      2⤵
                        PID:4076
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                        2⤵
                          PID:3024
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5520 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                          2⤵
                            PID:1068
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5564 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                            2⤵
                              PID:3796
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5848 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:1
                              2⤵
                                PID:3988
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                                2⤵
                                  PID:2280
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5076 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                                  2⤵
                                    PID:68
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1660 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                                    2⤵
                                      PID:4532
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2888 --field-trial-handle=1820,i,2724380834466068458,11619326910313429367,131072 /prefetch:8
                                      2⤵
                                        PID:4640
                                      • C:\Users\Admin\Downloads\VAPEV4.10.exe
                                        "C:\Users\Admin\Downloads\VAPEV4.10.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:700
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:4440

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              312B

                                              MD5

                                              d9445768fb02197c7ff086e51cb53b34

                                              SHA1

                                              fe53729cf67f75a3e29dba3b1d86f4365408e593

                                              SHA256

                                              9e13e8862a63f4952e2ba7bd5bda5d2013eed95e1c19bc3bac94bb10936f4fcf

                                              SHA512

                                              d8b26559e26e977cd9d6d654d0b790f0a713e51f3ac0a1895e11ad184ade475dec0b57841918b0dbdcd1574a6ed1e8b70a0f9bb2a8869f922d97203171dc1b8f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              3KB

                                              MD5

                                              c7e6178c39b6b275da2f5d868643e80a

                                              SHA1

                                              f8886b54e3cde2d48f84b413d440265c59a2a5ee

                                              SHA256

                                              5179292ce3b9f8672308f5bd9cdcf848762bbe765f2ec246dd660a111efed830

                                              SHA512

                                              1ed8ec6bac8d8aa2085a89cfaf41537a6c39586d7df07bde88cb574c5e5a695901e5ef09da77d131ab653e101b53e6b96d1d64709958e85e3735d22cf0820b39

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              f40519d00f0f7305b093d6a8a7797440

                                              SHA1

                                              d5fd1103cf23d303174828043e0f43774ef16c8e

                                              SHA256

                                              4c350b7cd10d3489f02fb0e30762a9a9408122fa2d0149e2a9383b620647ca91

                                              SHA512

                                              3a77685454c348877d990c67167db28bc716d3c63efda49c5ed6f1540f1aaa3047394b581da5d495dd3a21e8afe9ee7253af89ba544783aafde08b63030eb43a

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              b6207266e4a18a56e01efb6a13149d6e

                                              SHA1

                                              2ea87d78e2e495179219ea16d933d835034cc10f

                                              SHA256

                                              99ae3be64a603ee6eff85fd5260861cb1e8e142516474bc2f5c112368a37e0c1

                                              SHA512

                                              7bcaef5816f6bdcf01caa4152d110a5480547d4062a0514fbf750d6f0ea275a22806e3dc3b926d40e74ef6bd290a48f9c9e2170ff663dad01f52526888e90639

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              147ea23402dce20454bb35bcb0eccde8

                                              SHA1

                                              c3956e9b5298134ca3b19b1257e86bafdeeffd03

                                              SHA256

                                              239d3e878f5ad980461f847b1e8708953e717bf0cbd5b0763dda6b47b145d5e2

                                              SHA512

                                              07f3eb080638277df3c1fe869027de7c2509221df099afc28b76fd4a2dac38cce1f8ad5a19d94963ce474fb23105da45b053994ff47b67ad35a50db11a3e01ac

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              dd8b2fceba41897f1d9b38ac69d7788d

                                              SHA1

                                              88804ae8388eb0b589dbe744a0bcc65e6704ef90

                                              SHA256

                                              db6678945c0dc95002afd710ee02bceb0f3e18851b2a8ee6059a15cf24f6f39f

                                              SHA512

                                              b64705aec4f1159507e92bfc8daa9b98a9d5c77241e6eafa22e9b09ef84b28fea04f32233dd22bd3c914a4fd86dde85577011e8196fe1fdf0b7493c0fb5f745a

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              136KB

                                              MD5

                                              99c525ba83bb4d9132e79a91110b77b1

                                              SHA1

                                              95b10b6cce2a79ddd68886b2af67fbbeecd97d68

                                              SHA256

                                              5e12b8e619b8080887473b36a1b9e3564f32ff04bd4639ed261f3f554778b96b

                                              SHA512

                                              2a29e79c8aac1fea58977b69ff4cd78de8634f7241857ebf3448c2ef005ffdc207ee67bfe487d62a1a166aeffc58bd370129ae1b80168976a8095ba22d05a2b9

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              136KB

                                              MD5

                                              7c9cda2bd1a8b0c3e2d20362baf95294

                                              SHA1

                                              5eaf218f56c082a72d6cd180161c63797de45924

                                              SHA256

                                              b822188de161362d492e57f0013dd446ceed1b52c42ef3ba0e556581c250e3f4

                                              SHA512

                                              be10878d221e05034640f461c3310d1a23ed132adca80bb68e37e803f37bd4b28dbc43b4404becafd722e058eda82a79b8254027f17f29c99264f6d0d12323cc

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              136KB

                                              MD5

                                              620c9768c271779e1b5adb53803fe9b1

                                              SHA1

                                              08267accaa4af05247f0086d7386975c001583ec

                                              SHA256

                                              e51c833d7ae4ba3a4f8cc9f13744f4354cc8510332088c72e3053df42689d27b

                                              SHA512

                                              41ace3a95750086e86fe2e6665062b8838cb2552a4ff26a82ca068d0ef14ebf39987c33d62544ef5ddb644ad65611a27b300b2c8c3c0c05c48dac1005ec8ed2e

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              2e28dd64012d081c6bf223390ec76def

                                              SHA1

                                              6146974833feb41141029f37783551b32d09875c

                                              SHA256

                                              cdbe40ce60d712e4efe2700571215eb257cf8eb8e4750370f1d10e0a8a96279f

                                              SHA512

                                              1b2ba9ac3e6dda32f122a4af388df9757c6ba599745b3703356fc50d76dbf727a341c9f0ba24b09d9ac7424aea5b5b0ce5c3e6ddbb29f97435a3d545b577195a

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                              Filesize

                                              2B

                                              MD5

                                              99914b932bd37a50b983c5e7c90ae93b

                                              SHA1

                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                              SHA256

                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                              SHA512

                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                            • memory/700-228-0x00000258B5D30000-0x00000258B5EA6000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/700-154-0x00007FFAA3123000-0x00007FFAA3124000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/700-155-0x0000025897B10000-0x000002589B76A000-memory.dmp

                                              Filesize

                                              60.4MB

                                            • memory/700-227-0x00007FFAA3120000-0x00007FFAA3B0C000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/700-249-0x000002589BCF0000-0x000002589BD22000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/700-252-0x00000258B61A0000-0x00000258B61BC000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/700-253-0x00000258B5FC0000-0x00000258B5FC6000-memory.dmp

                                              Filesize

                                              24KB

                                            • memory/700-254-0x00007FFAA3120000-0x00007FFAA3B0C000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/700-255-0x00007FFAA3120000-0x00007FFAA3B0C000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/700-256-0x00007FFAA3120000-0x00007FFAA3B0C000-memory.dmp

                                              Filesize

                                              9.9MB