Analysis
-
max time kernel
158s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-06-2022 06:11
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20220414-en
General
-
Target
vbc.exe
-
Size
510KB
-
MD5
ed110000e4a38ea4c524a777c0b28a38
-
SHA1
a82ea598a09bf51269131363d2ca1120e45c92aa
-
SHA256
33804adf1254ef1376ce4a0416ff03db837b5bf23a752b8483ffdc1738a5cb59
-
SHA512
b771cae1b0e7a25d58dbbdb60a86d39bed08d6c0f97d18b928cb1179dba6911f494b4cec853d169d3113f2a7afa1c3ac45e6fb74f6c6a1fa73978b9209c0de4e
Malware Config
Extracted
xloader
2.9
wfc6
FPF0BDtsP/0Z3N3EpIfSsQ==
wZbFgKkm5jUpFbB+GQ==
I/oJ0Jcb+eoMqQ==
w7zarxxnPcIgupA=
63SbUimyWalvjfJdRb9U
igCt44uCBYeAugeiTMZW
ZHJ4C8BlAvVDAIRo
XJUEKbSv5SVkKdCoWvkuKiQ=
TDPHixX7VMIgupA=
Xt5NdBkHqXeYgHtS6Lik7Sw=
rJKZiOi3mIr7iH5dEQ==
wbheFmd7+XMkt7KALN8A2NcT+npeUP+g
xqk06+lXAT3bemE847ik7Sw=
YS7SndCMWuCAFbB+GQ==
tJ4lxa1kPUfSZ4UiujZGLCQ=
j8gSmNPGzqe6
iQORUvIx0N1glkfomjmZCzmGPbKE/A==
dlD3cvHVcUBqgNrHpIfSsQ==
Sk9cCV2WvRkavg==
70RVeKQWsgOZMyf+0g0zKyM=
ohA2+Np+OXsEkI9kEcH18SFl14w=
ST7zr+vrjluKY0044qtjpaActyK9
CXijyOBe299npm3+ozM=
tphA7dOGMwEL+E4g/LbEqA==
wZY0YPg56DPTpVAowDs=
lGgNzOJX9yWTNZJx
IukdRenq0udDAIRo
/v2eVZ/MuMJDdtCjO7pJmVRGDftzvas62w==
feXz+6MdJRoTzIc=
X1gMxLgjzQqpQh37n0qlSXq5
bvYhjGIj+eoMqQ==
JnygzOBS4RoTzIc=
aE5SgJwPjJMaX+LFadoOYaArpJmB9ps=
ZVoMNsGzYh4uFbB+GQ==
Y/h4es8mfMIgupA=
5LY/YvHhvRkavg==
X9jXctO6Rd0BHIRTCp9Asnl/h7heUP+g
d9naXx+nRMIgupA=
ZEbgr2pZMCg5Kphx
8Fhj8rA21BCbyA6tjcV5uQ==
mZAZqt/JZStIYMZdRb9U
VU1PAFiTvRkavg==
d8b+wmHKSk3UFZ5zCY95/DM=
mJKsYw+CInX2XW3+ozM=
nOcOwY8W+eoMqQ==
4tyXN3eC9m8RnZFiC7v38SFl14w=
CYB9GOdpC1YDULZdRb9U
vCtZAF6ROnP6g4JS47ik7Sw=
qn4l0rBZCNb49n1A4rik7Sw=
8jY5Oo2TMPEYScRdRb9U
uLhFDueWOXGt
cPqn2X1t8bDiAHBC4FelSXq5
RC5DCM9m6vyHvkgZtU01q04hqs5v8A==
Lg22bRP9zNJG30QOwll3qyFl14w=
9PLzES2aQZcTfVoz4bik7Sw=
LaLYmAfLUFr4ULpdRb9U
+3D9DY7joOWGGQTqmkqlSXq5
v4VAbfsSO/JDAIRo
Pkbwmo1bGvRDAIRo
bMTnAuajbyg18OfCpIfSsQ==
XqzQnn/+pQGhCdu2YRRQoCFl14w=
aWd4kIAzHy2TNZJx
mY5/lIo95Zu4Y0rXud+C8TU=
8AAvYXM4BuUB5D0q/LbEqA==
ssdunlimited.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
resource yara_rule behavioral2/memory/1724-140-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/1724-142-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/3888-152-0x0000000000710000-0x000000000073C000-memory.dmp xloader -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation vbc.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1052 set thread context of 1724 1052 vbc.exe 93 PID 1724 set thread context of 3060 1724 vbc.exe 54 PID 3888 set thread context of 3060 3888 explorer.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 3528 powershell.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3528 powershell.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe 3888 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 3888 explorer.exe 3888 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1724 vbc.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3888 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1052 wrote to memory of 3528 1052 vbc.exe 89 PID 1052 wrote to memory of 3528 1052 vbc.exe 89 PID 1052 wrote to memory of 3528 1052 vbc.exe 89 PID 1052 wrote to memory of 4060 1052 vbc.exe 91 PID 1052 wrote to memory of 4060 1052 vbc.exe 91 PID 1052 wrote to memory of 4060 1052 vbc.exe 91 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 1052 wrote to memory of 1724 1052 vbc.exe 93 PID 3060 wrote to memory of 3888 3060 Explorer.EXE 94 PID 3060 wrote to memory of 3888 3060 Explorer.EXE 94 PID 3060 wrote to memory of 3888 3060 Explorer.EXE 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\atfDjSnEZXbNX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\atfDjSnEZXbNX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp63A7.tmp"3⤵
- Creates scheduled task(s)
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d3789aeb5fea0caeaa907aa73c7df749
SHA1e57ed18dfc249e0197732071ff35308a29710295
SHA256cbaa55edad18767b5b6ee80c979bd7885ef4c7a5094adb24e4a70b318c3544fc
SHA512662f960b16ee25806edad0f21a999837f7a17cd4674e92a05703467d72c716fb80525ca21579d15e77af983f8ebea6cbcec85b149ac567400440ae12944c51f4