Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 17:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/M1W9690/Vape-V4-Cracked-free/releases/download/VapeClient/Vape.Ghost.Client.exe
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/M1W9690/Vape-V4-Cracked-free/releases/download/VapeClient/Vape.Ghost.Client.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5332 Vape.Ghost.Client.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 220863.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 4888 msedge.exe 4888 msedge.exe 2688 identity_helper.exe 2688 identity_helper.exe 5220 msedge.exe 5220 msedge.exe 5232 msedge.exe 5232 msedge.exe 5232 msedge.exe 5232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 392 4888 msedge.exe 84 PID 4888 wrote to memory of 392 4888 msedge.exe 84 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 980 4888 msedge.exe 85 PID 4888 wrote to memory of 1124 4888 msedge.exe 86 PID 4888 wrote to memory of 1124 4888 msedge.exe 86 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87 PID 4888 wrote to memory of 2912 4888 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/M1W9690/Vape-V4-Cracked-free/releases/download/VapeClient/Vape.Ghost.Client.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xfc,0x108,0x7fff877946f8,0x7fff87794708,0x7fff877947182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5220
-
-
C:\Users\Admin\Downloads\Vape.Ghost.Client.exe"C:\Users\Admin\Downloads\Vape.Ghost.Client.exe"2⤵
- Executes dropped EXE
PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11531684638263501223,12245886340959035577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD54f4facba90c27388f6f691b77e11d18a
SHA11a0c5e90b0e32190ef7ff1233f47c3b116160048
SHA256af2bb6c67002b5618cf13655697055682ee6697aced36f30174362e43b5d2db0
SHA5129ae5831d3e5aa095cc164295399517a445680fc0a833146c144bc016fee9f56c2f524abd1d84f2c27721100afa6e046f6f0d1f11cdba8b127850b6c09829617b
-
Filesize
6KB
MD55ef4b658f9cc1dc861bdcfb6ab47a08a
SHA124dc2905d54154bca720dbc55abde0c843103643
SHA256729df6c987a295accf61e3d71b7d2df091d1e085427aca0dc93e78eaaafc8d82
SHA51204f665913e8b04f7a2f44bef31740713646d7714bde696c9025a81a085bc71c8bad8f10802cfa55dfb6169850475851eaf653a58ccfff366d66003d43e26eb5f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5cc34cc1796280745d944a3fae7b02246
SHA1821a286eeff682a414543e9b9d9bf3e28bb8631a
SHA256b3c96363acb86316bcb21ffb0dc7a33a31911a3a059e1e6557f493614606ae76
SHA5127ed22fcc405aedf4cf396c6272aee4e2796a746dca7550ac2fd4defd877cb6360a7f8079e142f15b90aa6c11260cd913456c8b333aa4f3e5eaf81d2dccfa5fbb
-
Filesize
11KB
MD5965cd7c54b0b8384e64952dfc2b7cc2a
SHA1f8721ce80c49dd2eca3db7562fd2914abc45858d
SHA256f59412ee6f330b9adc87e3f273e6e3e45d49f90595f523670840edd782518a9c
SHA5120575ea5be1fcab9be146a3b53dc00d642898a0403abe9cf3bed043c3bb8153e206243739d6f95b96ce22deca72e51bf3542c83b59eb1940b89790a0004e0d49a
-
Filesize
5.2MB
MD535df05b7c1961a0f69bd99ea78732656
SHA10b6c342574f28ff311232549db6c4f147db779dc
SHA2561da503b09db301240e0e884cb784c00ac36bed73ff1589706db852fd21dc1b90
SHA512a19686a1d3b4366091a931d2270c8c263c504106abb9b302de6c51df271cabd6523b699c37c4333135f61699d037d640f07a15e791c220ac1dd5a190eef5eb1c