Analysis
-
max time kernel
1776s -
max time network
1778s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 19:36
Behavioral task
behavioral1
Sample
Vape-Lite-main/Vape lite/Vape Lite/Vape Lite.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
Vape-Lite-main/Vape lite/dumper/mitm_server.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Vape-Lite-main/python-3.12.4-amd64.exe
Resource
win10v2004-20240709-en
General
-
Target
Vape-Lite-main/Vape lite/dumper/mitm_server.py
-
Size
4KB
-
MD5
fb2ea3294517bab463df4273e7c6bcd6
-
SHA1
1a5eb75bff26c1d8a8cfefa57a8ea7fe366b7546
-
SHA256
bc130c050da31bc55f7d6aa1c7a7e0817f289fa0eaf72ffa253cbaa10c45aff7
-
SHA512
ef56b9000dca93f34a5badb94299f27cd0cca267decf9c99b60dfe7b60d5df748900da7a422882a80f0a26a552bcb0588298096aa56d80c2026e190da862dfa7
-
SSDEEP
96:I5kbEiPPT7JDOKVyqOeyJCA1B5FE9pWbWCGkBRP4:I5niPPT7JDP+eyJt1XFErWs84
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 824 OpenWith.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe 824 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Vape-Lite-main\Vape lite\dumper\mitm_server.py"1⤵
- Modifies registry class
PID:1440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:824