Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 14:40
Behavioral task
behavioral1
Sample
vape.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vape.exe
Resource
win10v2004-20240802-en
General
-
Target
vape.exe
-
Size
1.6MB
-
MD5
568f7c906d45ff35c95961c922858959
-
SHA1
d3e5ec1c4f7699c72818b75849492fb8c24af319
-
SHA256
48b427450219751c5b38bb8b142c544ed639f0b69270b0f48e644e33da5339c0
-
SHA512
0635a29001975d6e633947fc74e4193748870cdbc1cf0b4fef98cebe0f179c4b1890eb7cb2b31174ab40d393e7d4158968c83a823fcc82b08c14881fe62ccc1d
-
SSDEEP
24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywb0i:GTq24GjdGSiJxkqXfd+/9AqYanCLb
Malware Config
Extracted
stealerium
https://discordapp.com/api/webhooks/1287935626867507220/BgogLYeO8w14cbtGvpxtN4uXBwwaccgHejFyV0i3qBC62fEY_0tlZU5EJ0YpWB-KbZaH
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation vape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4700 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4384 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3372 vape.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3372 vape.exe Token: SeDebugPrivilege 4384 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2636 3372 vape.exe 83 PID 3372 wrote to memory of 2636 3372 vape.exe 83 PID 3372 wrote to memory of 2636 3372 vape.exe 83 PID 2636 wrote to memory of 3452 2636 cmd.exe 85 PID 2636 wrote to memory of 3452 2636 cmd.exe 85 PID 2636 wrote to memory of 3452 2636 cmd.exe 85 PID 2636 wrote to memory of 4384 2636 cmd.exe 86 PID 2636 wrote to memory of 4384 2636 cmd.exe 86 PID 2636 wrote to memory of 4384 2636 cmd.exe 86 PID 2636 wrote to memory of 4700 2636 cmd.exe 87 PID 2636 wrote to memory of 4700 2636 cmd.exe 87 PID 2636 wrote to memory of 4700 2636 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\vape.exe"C:\Users\Admin\AppData\Local\Temp\vape.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpE1E4.tmp.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 33723⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD570bf107736f54674dde837ccc614808b
SHA1e463d4cb11a60546c8a2c409555c26bcf2de2948
SHA25645579a817ba3bd10d189dbb6b827414a1c293f6a894ba47dec91b324d8d5ddf1
SHA5124e9e0e46e92a032ed0659fa4f96bbd787595f749d3886142224836ab9022b6c4deb30913175ecb9b249af992feb85542c491fbeab6bdfe1b0118dd12447c326f