Overview
overview
7Static
static
3vblob.rar
windows7-x64
7vblob.rar
windows10-2004-x64
7Vblob cs2 ...al.exe
windows7-x64
1Vblob cs2 ...al.exe
windows10-2004-x64
1Vblob cs2 ...l.json
windows7-x64
3Vblob cs2 ...l.json
windows10-2004-x64
3Vblob cs2 ...ui.ini
windows7-x64
1Vblob cs2 ...ui.ini
windows10-2004-x64
1Vblob cs2 ...s.json
windows7-x64
3Vblob cs2 ...s.json
windows10-2004-x64
3Vblob cs2 ...rd.txt
windows7-x64
1Vblob cs2 ...rd.txt
windows10-2004-x64
1Analysis
-
max time kernel
52s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
vblob.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vblob.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Vblob cs2 external/Vblob external.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Vblob cs2 external/Vblob external.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Vblob cs2 external/client.dll.json
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Vblob cs2 external/client.dll.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Vblob cs2 external/imgui.ini
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Vblob cs2 external/imgui.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Vblob cs2 external/offsets.json
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
Vblob cs2 external/offsets.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Vblob cs2 external/password.txt
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Vblob cs2 external/password.txt
Resource
win10v2004-20240226-en
General
-
Target
vblob.rar
-
Size
472KB
-
MD5
3f6d2008648730e00b03c35f8dc7c219
-
SHA1
33edc8277c52cd2b1c9e0cab846c9f63e5bc5a9c
-
SHA256
0afe4ad2eb7df24e1880f2b6c1c9f965a1d4e1d1b70a276487c1705ebd20cffd
-
SHA512
45a1b18e32c094c0818ff8a9ea10a28b29b723129a3753950170288dca7e6c0f4483063659cc6404a7ef0a1a9acfa45eac7a8105912547cde556841456d6e7b1
-
SSDEEP
12288:NP3aC4AtoXOgZzSRV844+qLSZZfJimiqXCWL9w:p0Og0lnUSZjFXlw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1888 Vblob external.exe -
Loads dropped DLL 5 IoCs
pid Process 2688 7zFM.exe 2448 WerFault.exe 2448 WerFault.exe 2448 WerFault.exe 2448 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2688 7zFM.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2688 7zFM.exe Token: 35 2688 7zFM.exe Token: SeSecurityPrivilege 2688 7zFM.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe Token: SeShutdownPrivilege 2456 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2688 7zFM.exe 2688 7zFM.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe 2456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2688 2780 cmd.exe 29 PID 2780 wrote to memory of 2688 2780 cmd.exe 29 PID 2780 wrote to memory of 2688 2780 cmd.exe 29 PID 2688 wrote to memory of 1888 2688 7zFM.exe 30 PID 2688 wrote to memory of 1888 2688 7zFM.exe 30 PID 2688 wrote to memory of 1888 2688 7zFM.exe 30 PID 1888 wrote to memory of 2448 1888 Vblob external.exe 31 PID 1888 wrote to memory of 2448 1888 Vblob external.exe 31 PID 1888 wrote to memory of 2448 1888 Vblob external.exe 31 PID 2456 wrote to memory of 2744 2456 chrome.exe 33 PID 2456 wrote to memory of 2744 2456 chrome.exe 33 PID 2456 wrote to memory of 2744 2456 chrome.exe 33 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 2084 2456 chrome.exe 35 PID 2456 wrote to memory of 1860 2456 chrome.exe 36 PID 2456 wrote to memory of 1860 2456 chrome.exe 36 PID 2456 wrote to memory of 1860 2456 chrome.exe 36 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37 PID 2456 wrote to memory of 2108 2456 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\vblob.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vblob.rar"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\7zO08AE8066\Vblob external.exe"C:\Users\Admin\AppData\Local\Temp\7zO08AE8066\Vblob external.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1888 -s 804⤵
- Loads dropped DLL
PID:2448
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7c19758,0x7fef7c19768,0x7fef7c197782⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:12⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1424 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:22⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2828 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3360 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 --field-trial-handle=1400,i,2916227319748577997,2117650643063823990,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5e8a7ccfe1f410c18204d172a1e7c23b3
SHA175e4a29283eb27fb7316db9f94a38dc517bb0ce6
SHA256ae4b8d25ff98dfde447a55bf9e72a0673cca4ae3741c60feb8abb5a72b1c265a
SHA5123d584eec4c4d6f51ec7104c3be557e8c276dd351c29553b91d50bfb9ed22dd1d75456dddb19982c47a7d0991f5d4408648175befa88090bdb6ccbb18667ebf29
-
Filesize
5KB
MD5004e3707ea1f7d83b51ba855b93942a1
SHA1e286b349338bc8de2ea5cd0d0fe9a81dfc79da62
SHA256a611ea8226ba2b5023f7198062b3ac457b413c0c1158050454428dc874af122b
SHA512c5c07e6e6bcb69af325cd691e70f7c70a5f3be181853141d003170ad5b88e31f15ecb99c723f0bd40a43ee08a184f285e92dcad84e06445de40c598d5209edf6
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1004KB
MD5f325bca9e8b0f6b0ca69341376117e43
SHA1523e681598aab11464c3b7b6b321c0c000c56e86
SHA256d75551b96e7c9112aa131f85a6a55f3340d4db1599ed867d262bde0fcca6865c
SHA512a6daf6d75cb107b281b04dd510e7c91fde96e9609e23897956a3286d624e2f41ba576c96e8c3c499967814502f8d93691310a7864a944d06037e7c6f7d71fc3d