Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
Vape V4 Crack.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Vape V4 Crack.exe
Resource
win10v2004-20241007-en
General
-
Target
Vape V4 Crack.exe
-
Size
1.7MB
-
MD5
6a669de1d724cc4874c42ae535ca892d
-
SHA1
de905655fd632fff874bc907726e9b9a16886ea9
-
SHA256
5d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454
-
SHA512
23ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708
-
SSDEEP
49152:eBtqFWM4ml3lxIoOgHHYgta7zJQUvrQsY3LZrSN:eBtqB4mbGRvgGN
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
you@regay
Signatures
-
Hawkeye family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" Defender.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" Defender.exe -
Detected Nirsoft tools 7 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x000900000001628b-7.dat Nirsoft behavioral1/memory/1008-73-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1008-74-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1008-75-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2272-77-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/2272-78-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/2272-85-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/files/0x000900000001628b-7.dat MailPassView behavioral1/memory/1008-73-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1008-74-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1008-75-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/files/0x000900000001628b-7.dat WebBrowserPassView behavioral1/memory/2272-77-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/2272-78-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/2272-85-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Deletes itself 1 IoCs
pid Process 3060 Windows Update.exe -
Executes dropped EXE 5 IoCs
pid Process 3060 Windows Update.exe 728 EBFile_3.exe 1204 EBFile_2.exe 276 Defender.exe 2016 Defender.exe -
Loads dropped DLL 4 IoCs
pid Process 2424 Vape V4 Crack.exe 3060 Windows Update.exe 3060 Windows Update.exe 1204 EBFile_2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection Defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\DisableAntiSpyware = "1" Defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection Defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Defender.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyipaddress.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Defender.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini Defender.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3060 set thread context of 1008 3060 Windows Update.exe 39 PID 3060 set thread context of 2272 3060 Windows Update.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EBFile_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vape V4 Crack.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2832 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 276 Defender.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 276 Defender.exe 276 Defender.exe 276 Defender.exe 276 Defender.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 276 Defender.exe 276 Defender.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe 3060 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3060 Windows Update.exe Token: SeDebugPrivilege 276 Defender.exe Token: SeAssignPrimaryTokenPrivilege 276 Defender.exe Token: SeIncreaseQuotaPrivilege 276 Defender.exe Token: 0 276 Defender.exe Token: SeDebugPrivilege 728 EBFile_3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 Windows Update.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 2424 wrote to memory of 3060 2424 Vape V4 Crack.exe 31 PID 3060 wrote to memory of 2832 3060 Windows Update.exe 33 PID 3060 wrote to memory of 2832 3060 Windows Update.exe 33 PID 3060 wrote to memory of 2832 3060 Windows Update.exe 33 PID 3060 wrote to memory of 2832 3060 Windows Update.exe 33 PID 3060 wrote to memory of 1204 3060 Windows Update.exe 34 PID 3060 wrote to memory of 1204 3060 Windows Update.exe 34 PID 3060 wrote to memory of 1204 3060 Windows Update.exe 34 PID 3060 wrote to memory of 1204 3060 Windows Update.exe 34 PID 3060 wrote to memory of 728 3060 Windows Update.exe 35 PID 3060 wrote to memory of 728 3060 Windows Update.exe 35 PID 3060 wrote to memory of 728 3060 Windows Update.exe 35 PID 3060 wrote to memory of 728 3060 Windows Update.exe 35 PID 1204 wrote to memory of 276 1204 EBFile_2.exe 36 PID 1204 wrote to memory of 276 1204 EBFile_2.exe 36 PID 1204 wrote to memory of 276 1204 EBFile_2.exe 36 PID 1204 wrote to memory of 276 1204 EBFile_2.exe 36 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 1008 3060 Windows Update.exe 39 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40 PID 3060 wrote to memory of 2272 3060 Windows Update.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vape V4 Crack.exe"C:\Users\Admin\AppData\Local\Temp\Vape V4 Crack.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\BFile_1.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe"C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Defender.exe"C:\Users\Admin\AppData\Local\Temp\Defender.exe" /D4⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:276 -
C:\Users\Admin\AppData\Local\Temp\Defender.exe"C:\Users\Admin\AppData\Local\Temp\Defender.exe" /SYS 15⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe"C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258B
MD51a315f228b55458f972213ed7d06a82d
SHA1abd233b01b6532ff259e574f95f218a11c5b6caa
SHA256f31a1549c0ded4a9de1cfc44a7fe54b95c233379dae6dc58c56609a2381cc7f5
SHA5129427ec6918639f3e0f12f2cbcb6a4f2b379cdb5e7042993a53b74077139817f711e5ded15579a3a8e5ae9c47216c618dfee96847b340e58cf8e8475a5ac828cf
-
Filesize
14KB
MD5fde2f12ea09556a7d28e4d10a80c0e88
SHA19c44959deda54054be62d00fc1bd8254efcf4f69
SHA25653509887881cb405ddb046fb70dcaa55c7e8f02b23799384dbfb7b97cc898968
SHA512c7832129ec62fd788394a5622b95b4536e1e3cac3938572a85c9b5deb17da13ac86166f322aab83a4baed97a990e2323e84dca3f518931897970da039e343cee
-
Filesize
51B
MD53f2fc3441f52129c43ab1a36175b98c8
SHA108e8bcc104a8e5b94c2756a9a3cc92173e62ffb3
SHA2564a72e051dba5170f143ff540008121f48de2a3488fed02f2458e16f974c4a26e
SHA51224f8d6015f9a3d42b7a10b4ee7fa18c0d00bdb9b94777dd4f20864a25956dab2d89c60fb991599515b4cd7beeec7a985edafcffac9833509045c6e054ec20e39
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
233B
MD5cd4326a6fd01cd3ca77cfd8d0f53821b
SHA1a1030414d1f8e5d5a6e89d5a309921b8920856f9
SHA2561c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c
SHA51229ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67
-
Filesize
37KB
MD54f4cfdec02b700d2582f27f6943a1f81
SHA137027566e228abba3cc596ae860110638231da14
SHA25618a13223c2587bc03ce14be7a63325f3c60d6f805e1bb96e32025ecdc1d620b7
SHA512146128ecb8bc682510a92f58cea58bfed68a215438d235b1b79ad6e0ef1f0f6a6b9400c7b83d70ddf7d8a22a5bcaca17b6532650192b4448e811dd7b4335b592
-
Filesize
802KB
MD5ac34ba84a5054cd701efad5dd14645c9
SHA1dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b
SHA256c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e
SHA512df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a
-
Filesize
810KB
MD51d6a2397610b09dd6b49785182fd13d2
SHA14a4ccd35f98544d0dd5bd6a30f9101c7babb36d3
SHA256e96c14e2853a64717b64d3972e436dcfb39daa539ed1b67c8a58caafdf22c923
SHA512fe0c86e696e39386e58355ed887238ddb3ae5f1013cbcbae16fe61f968a537a831bae7c3deb4cd0342d898d5fa5b20d662831d83ad7ab22fb0ce9e7834d9cb82
-
Filesize
1.7MB
MD56a669de1d724cc4874c42ae535ca892d
SHA1de905655fd632fff874bc907726e9b9a16886ea9
SHA2565d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454
SHA51223ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708