Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/09/2022, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
vbc.exe
Resource
win10v2004-20220901-en
10 signatures
150 seconds
General
-
Target
vbc.exe
-
Size
700KB
-
MD5
155c62e374f3cd624d9fdbc7e6cc680a
-
SHA1
4cc119371a976c7f6f2d096c50da37686d79ae0f
-
SHA256
7d2b174c017d61fcd94673c55f730821fbc30d7cf03fb493563a122d73466aab
-
SHA512
63c0fdbca53e454c222c7035d723bc73dfd237f99781bdc7d14b18ad9a0587bed2ce66914a0a89ebcc05662248b1bfa3b93e5a198ded683ba73846d8247c760d
-
SSDEEP
12288:GCm8O1EYZPU3zi2XqHnVnVhYw4nsxqWLwmCHmDjbBUlzj:GCm8CEQPU3zp6HnVo8qWL3CUjVUR
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe 1944 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 vbc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1756 1944 vbc.exe 27 PID 1944 wrote to memory of 1756 1944 vbc.exe 27 PID 1944 wrote to memory of 1756 1944 vbc.exe 27 PID 1944 wrote to memory of 1756 1944 vbc.exe 27 PID 1944 wrote to memory of 1728 1944 vbc.exe 28 PID 1944 wrote to memory of 1728 1944 vbc.exe 28 PID 1944 wrote to memory of 1728 1944 vbc.exe 28 PID 1944 wrote to memory of 1728 1944 vbc.exe 28 PID 1944 wrote to memory of 1380 1944 vbc.exe 29 PID 1944 wrote to memory of 1380 1944 vbc.exe 29 PID 1944 wrote to memory of 1380 1944 vbc.exe 29 PID 1944 wrote to memory of 1380 1944 vbc.exe 29 PID 1944 wrote to memory of 616 1944 vbc.exe 30 PID 1944 wrote to memory of 616 1944 vbc.exe 30 PID 1944 wrote to memory of 616 1944 vbc.exe 30 PID 1944 wrote to memory of 616 1944 vbc.exe 30 PID 1944 wrote to memory of 1316 1944 vbc.exe 31 PID 1944 wrote to memory of 1316 1944 vbc.exe 31 PID 1944 wrote to memory of 1316 1944 vbc.exe 31 PID 1944 wrote to memory of 1316 1944 vbc.exe 31 PID 1944 wrote to memory of 1720 1944 vbc.exe 32 PID 1944 wrote to memory of 1720 1944 vbc.exe 32 PID 1944 wrote to memory of 1720 1944 vbc.exe 32 PID 1944 wrote to memory of 1720 1944 vbc.exe 32 PID 1944 wrote to memory of 1740 1944 vbc.exe 33 PID 1944 wrote to memory of 1740 1944 vbc.exe 33 PID 1944 wrote to memory of 1740 1944 vbc.exe 33 PID 1944 wrote to memory of 1740 1944 vbc.exe 33 PID 1944 wrote to memory of 1148 1944 vbc.exe 34 PID 1944 wrote to memory of 1148 1944 vbc.exe 34 PID 1944 wrote to memory of 1148 1944 vbc.exe 34 PID 1944 wrote to memory of 1148 1944 vbc.exe 34 PID 1944 wrote to memory of 1348 1944 vbc.exe 35 PID 1944 wrote to memory of 1348 1944 vbc.exe 35 PID 1944 wrote to memory of 1348 1944 vbc.exe 35 PID 1944 wrote to memory of 1348 1944 vbc.exe 35 PID 1944 wrote to memory of 1716 1944 vbc.exe 36 PID 1944 wrote to memory of 1716 1944 vbc.exe 36 PID 1944 wrote to memory of 1716 1944 vbc.exe 36 PID 1944 wrote to memory of 1716 1944 vbc.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵PID:1716
-