Analysis
-
max time kernel
161s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 12:13
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20220414-en
General
-
Target
vbc.exe
-
Size
790KB
-
MD5
14f5bfcb44b9511f2cfac6f29ab55898
-
SHA1
f8dd1f7ec5259168dc98367c3eaa998f08b41a9d
-
SHA256
8ba3166fa29eedff427b62c2d1b05984949a1ac87a34ffa2ab95f4404e96d0e7
-
SHA512
0bd4db6d4f45a58b25445726956876d5546bcf73436b0b7c0411ef3d0e683fd91707551a146e775482399896ea6581caaa3d57d3e966a17a451315dcdf1f3b02
Malware Config
Extracted
xloader
2.5
arh2
anniversaryalert.com
kinship.space
buabdullagroup.com
ghostprotectionagency.com
scion-go-getter.com
skindeepapp.com
kysp3.xyz
bonitaspringshomesearch.com
bestdeals2022.online
themarketingstinger.com
chengkayouxuan.com
fendoremi.com
j-stra.com
klingelecn.net
deluxecarepro.com
huanbaodg.com
mes-dents-blanches.com
solutionsemissionsimplifiee.com
abedbashir.tech
good-collection.store
zulijian1.com
deuxtonnes.com
va-products.com
limpiezaspricila.com
hollyweednc.com
liylaehamartoyof4.xyz
lauraloewendesign.com
gozabank.com
iconicbeauty.co
huashiren.xyz
bdsdaivietphat.com
josephgoddard.com
bburagotr.xyz
produkoriginal.store
6156yy.com
cellfacility.com
elictriczone.com
regaldock.com
yourvitalstatistics.com
nextgen-shareholder.com
charlie-dean.com
abodebuildinggroup.com
fortunabs.com
elizabethsilvasuarez.com
setsrl.net
neskasdreams.com
abubuntunginxsetup.xyz
ubspropertyservices.com
spiritpriest.com
altaingenieriainc.net
oldhamcars.com
daimaoart.com
5u8n.com
ppcpowered.com
pmariutto.com
opendialogmonaco.com
project66bug.com
goddesscodes.love
talkingwithmarcus.com
tranvantuan.xyz
priexalidomoi.store
un2030.com
loancreditscan.com
tg88.bet
rshedm.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-137-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/980-144-0x0000000000420000-0x0000000000449000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vbc.exeRMActivate.exeipconfig.exedescription pid process target process PID 3472 set thread context of 3992 3472 vbc.exe RMActivate.exe PID 3992 set thread context of 2728 3992 RMActivate.exe Explorer.EXE PID 980 set thread context of 2728 980 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 980 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
vbc.exeRMActivate.exeipconfig.exepid process 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3472 vbc.exe 3992 RMActivate.exe 3992 RMActivate.exe 3992 RMActivate.exe 3992 RMActivate.exe 3472 vbc.exe 3472 vbc.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe 980 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2728 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RMActivate.exeipconfig.exepid process 3992 RMActivate.exe 3992 RMActivate.exe 3992 RMActivate.exe 980 ipconfig.exe 980 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vbc.exeRMActivate.exeipconfig.exedescription pid process Token: SeDebugPrivilege 3472 vbc.exe Token: SeDebugPrivilege 3992 RMActivate.exe Token: SeDebugPrivilege 980 ipconfig.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
vbc.exeExplorer.EXEipconfig.exedescription pid process target process PID 3472 wrote to memory of 824 3472 vbc.exe GamePanel.exe PID 3472 wrote to memory of 824 3472 vbc.exe GamePanel.exe PID 3472 wrote to memory of 824 3472 vbc.exe GamePanel.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 3472 wrote to memory of 3992 3472 vbc.exe RMActivate.exe PID 2728 wrote to memory of 980 2728 Explorer.EXE ipconfig.exe PID 2728 wrote to memory of 980 2728 Explorer.EXE ipconfig.exe PID 2728 wrote to memory of 980 2728 Explorer.EXE ipconfig.exe PID 980 wrote to memory of 4572 980 ipconfig.exe cmd.exe PID 980 wrote to memory of 4572 980 ipconfig.exe cmd.exe PID 980 wrote to memory of 4572 980 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\GamePanel.exe"C:\Windows\SysWOW64\GamePanel.exe"3⤵PID:824
-
-
C:\Windows\SysWOW64\RMActivate.exe"C:\Windows\SysWOW64\RMActivate.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\RMActivate.exe"3⤵PID:4572
-
-