Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
03-12-2021 14:27
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-en-20211014
General
-
Target
vbc.exe
-
Size
441KB
-
MD5
35971270d5d0406535ba77fa74bf4f21
-
SHA1
2ae768c1dd51a1bbefa32f2f8b620490ec026aae
-
SHA256
8f14202d038576081a716747d905248877b873edcec27a6406201d57b090ae8b
-
SHA512
e4f164fbdca5636b60e7f015b3f39e46f7188fc7eadc0557a8cce88c3150f2de18f6eb7e51659c3b91b82a5ff8325e7067e7d2061d32f9bc8de31ba7814031cf
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1052 1932 WerFault.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
vbc.exeWerFault.exepowershell.exepid process 1932 vbc.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1292 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vbc.exeWerFault.exepowershell.exedescription pid process Token: SeDebugPrivilege 1932 vbc.exe Token: SeDebugPrivilege 1052 WerFault.exe Token: SeDebugPrivilege 1292 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
vbc.exedescription pid process target process PID 1932 wrote to memory of 1292 1932 vbc.exe powershell.exe PID 1932 wrote to memory of 1292 1932 vbc.exe powershell.exe PID 1932 wrote to memory of 1292 1932 vbc.exe powershell.exe PID 1932 wrote to memory of 1292 1932 vbc.exe powershell.exe PID 1932 wrote to memory of 380 1932 vbc.exe schtasks.exe PID 1932 wrote to memory of 380 1932 vbc.exe schtasks.exe PID 1932 wrote to memory of 380 1932 vbc.exe schtasks.exe PID 1932 wrote to memory of 380 1932 vbc.exe schtasks.exe PID 1932 wrote to memory of 1052 1932 vbc.exe WerFault.exe PID 1932 wrote to memory of 1052 1932 vbc.exe WerFault.exe PID 1932 wrote to memory of 1052 1932 vbc.exe WerFault.exe PID 1932 wrote to memory of 1052 1932 vbc.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HWDkRuZX.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HWDkRuZX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA998.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 10122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA998.tmpMD5
8cc7db85854acf4a7496fb3ef97bab22
SHA1389b1a04aa7bca7870d6c9b2a526ed1d2201389f
SHA256c996c51ec12bc58359a3f6f3f969bf39e7ab3484dc9dd4455ea45ede56162d49
SHA512463ea9667bf4e06c53809b7fe775ad7a64a837e37ef1e0fe5ca8687f7376b0c903d0dfd65666ad88e666fb206719691a3fefb50d00bd358b515e98b3e52c8dff
-
memory/380-62-0x0000000000000000-mapping.dmp
-
memory/1052-69-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1052-65-0x0000000000000000-mapping.dmp
-
memory/1292-67-0x0000000002451000-0x0000000002452000-memory.dmpFilesize
4KB
-
memory/1292-61-0x0000000000000000-mapping.dmp
-
memory/1292-66-0x0000000002450000-0x0000000002451000-memory.dmpFilesize
4KB
-
memory/1292-68-0x0000000002452000-0x0000000002454000-memory.dmpFilesize
8KB
-
memory/1932-60-0x00000000051B0000-0x0000000005208000-memory.dmpFilesize
352KB
-
memory/1932-59-0x0000000000AB0000-0x0000000000AB8000-memory.dmpFilesize
32KB
-
memory/1932-58-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/1932-55-0x0000000000F40000-0x0000000000F41000-memory.dmpFilesize
4KB
-
memory/1932-57-0x0000000075901000-0x0000000075903000-memory.dmpFilesize
8KB