Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 07:55
Static task
static1
Behavioral task
behavioral1
Sample
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe
Resource
win10v2004-20220901-en
General
-
Target
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe
-
Size
1.3MB
-
MD5
5af2b36bdf6590fc19fc5b9bc448798c
-
SHA1
95d5c284304adffb6612d6f541815d94ae0039eb
-
SHA256
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e
-
SHA512
8220e0f86c1a84f4d4400dbf0401c5115d4419d3fd5883dba2261c34131061fda4d089a369becb858c2038b6327c2fa824112fbfe092874b606994db5e2c8112
-
SSDEEP
24576:voaA9jpW49EjGUxyM5S7jhrKdVPGQP17H6/VHWlugkviBFG+bMNtEr0Aoo6:voaw5AZ564/VlaATbxoL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Updater" vbc.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Updater = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Updater" vbc.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run vbc.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exedescription ioc process File created C:\autorun.inf cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe File opened for modification C:\autorun.inf cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe File created D:\autorun.inf cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe File opened for modification D:\autorun.inf cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exedescription pid process target process PID 1044 set thread context of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier vbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier vbc.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier vbc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1352 vbc.exe Token: SeSecurityPrivilege 1352 vbc.exe Token: SeTakeOwnershipPrivilege 1352 vbc.exe Token: SeLoadDriverPrivilege 1352 vbc.exe Token: SeSystemProfilePrivilege 1352 vbc.exe Token: SeSystemtimePrivilege 1352 vbc.exe Token: SeProfSingleProcessPrivilege 1352 vbc.exe Token: SeIncBasePriorityPrivilege 1352 vbc.exe Token: SeCreatePagefilePrivilege 1352 vbc.exe Token: SeBackupPrivilege 1352 vbc.exe Token: SeRestorePrivilege 1352 vbc.exe Token: SeShutdownPrivilege 1352 vbc.exe Token: SeDebugPrivilege 1352 vbc.exe Token: SeSystemEnvironmentPrivilege 1352 vbc.exe Token: SeChangeNotifyPrivilege 1352 vbc.exe Token: SeRemoteShutdownPrivilege 1352 vbc.exe Token: SeUndockPrivilege 1352 vbc.exe Token: SeManageVolumePrivilege 1352 vbc.exe Token: SeImpersonatePrivilege 1352 vbc.exe Token: SeCreateGlobalPrivilege 1352 vbc.exe Token: 33 1352 vbc.exe Token: 34 1352 vbc.exe Token: 35 1352 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exevbc.exedescription pid process target process PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1044 wrote to memory of 1352 1044 cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe vbc.exe PID 1352 wrote to memory of 1836 1352 vbc.exe explorer.exe PID 1352 wrote to memory of 1836 1352 vbc.exe explorer.exe PID 1352 wrote to memory of 1836 1352 vbc.exe explorer.exe PID 1352 wrote to memory of 1836 1352 vbc.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe"C:\Users\Admin\AppData\Local\Temp\cf98f5f40e09f782cb438b97d91596004cbb6754875ddb78990b89067d5b9b5e.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1836
-
-