Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 14:40
Behavioral task
behavioral1
Sample
vape.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vape.exe
Resource
win10v2004-20240802-en
General
-
Target
vape.exe
-
Size
1.6MB
-
MD5
568f7c906d45ff35c95961c922858959
-
SHA1
d3e5ec1c4f7699c72818b75849492fb8c24af319
-
SHA256
48b427450219751c5b38bb8b142c544ed639f0b69270b0f48e644e33da5339c0
-
SHA512
0635a29001975d6e633947fc74e4193748870cdbc1cf0b4fef98cebe0f179c4b1890eb7cb2b31174ab40d393e7d4158968c83a823fcc82b08c14881fe62ccc1d
-
SSDEEP
24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywb0i:GTq24GjdGSiJxkqXfd+/9AqYanCLb
Malware Config
Extracted
stealerium
https://discordapp.com/api/webhooks/1287935626867507220/BgogLYeO8w14cbtGvpxtN4uXBwwaccgHejFyV0i3qBC62fEY_0tlZU5EJ0YpWB-KbZaH
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2644 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2660 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1932 vape.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 vape.exe Token: SeDebugPrivilege 2660 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2636 1932 vape.exe 32 PID 1932 wrote to memory of 2636 1932 vape.exe 32 PID 1932 wrote to memory of 2636 1932 vape.exe 32 PID 1932 wrote to memory of 2636 1932 vape.exe 32 PID 2636 wrote to memory of 2784 2636 cmd.exe 34 PID 2636 wrote to memory of 2784 2636 cmd.exe 34 PID 2636 wrote to memory of 2784 2636 cmd.exe 34 PID 2636 wrote to memory of 2784 2636 cmd.exe 34 PID 2636 wrote to memory of 2660 2636 cmd.exe 35 PID 2636 wrote to memory of 2660 2636 cmd.exe 35 PID 2636 wrote to memory of 2660 2636 cmd.exe 35 PID 2636 wrote to memory of 2660 2636 cmd.exe 35 PID 2636 wrote to memory of 2644 2636 cmd.exe 36 PID 2636 wrote to memory of 2644 2636 cmd.exe 36 PID 2636 wrote to memory of 2644 2636 cmd.exe 36 PID 2636 wrote to memory of 2644 2636 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\vape.exe"C:\Users\Admin\AppData\Local\Temp\vape.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp3830.tmp.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 19323⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD5a3a5bc1d5f8bb0b60c4061c6cc4e23df
SHA1d247de476060fd0593f84503b6fbbc6e8f6e67a4
SHA256dc02ad875ede627b11edaf4f33133dc50559cfbf2704f3f3a55cbecce0559484
SHA51219b55ffa3b2daa3b88930b9d08e48dccb778fa8a8ba381a7e84f6c1f511de22dcd134fdb7d5d66fc54db58722bbe09a74e0443cb1341acda2889c6ec49019b71