Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vbc.exe
Resource
win10v2004-20241007-en
General
-
Target
vbc.exe
-
Size
611KB
-
MD5
da0fe038092ffec4ea327f0ec0d0c290
-
SHA1
d8bc98b32215c23d8b35bd998f3cb797bea58cbb
-
SHA256
40900faa35256d3ac7ec7116099f42a085244ecc802e9cea7522a7707eba7b62
-
SHA512
5c5625bd6d5dbc27e4310174f5bf83a6ec57c65e02911d2f9c101e7b7cc65aa0e7fbf82fb62f391f0f67b5a0706b8aa91ccfa6b9245083779bac4efc737459fb
-
SSDEEP
12288:V8hgEeGGMIEb/vnpd/OF1HW6nGYidFVDNVjSeUX8/a/zoTexh:VugEeGh/vnpxOT2kUfVjJUX8/abo
Malware Config
Extracted
xloader
2.6
gd9m
screens.ma
coachingdiary.com
cannabisconsultant.xyz
sirenonthemoon.com
gabrielatrejo.com
blumenladentampa.com
sturisticosadmcancun.com
qdygo.net
nubearies.com
thedestinationcrafter.com
fastblacktv.com
sanakatha.com
birdviewsecurityandshipping.com
waterfilterhub.xyz
92658.top
xigen.xyz
barikadcrew.com
herzogbjj.com
veminis.com
thnawya.net
gamertags.xyz
tenergyx.com
truthhaircuts.com
liveorangelake.com
paleosunvibes.com
globalworthy.com
editura-makarije.net
kashifashions.com
donestebanesquel.com
snoopsistahs.com
metatranzact.com
flawlesslook.store
ansiedademansa.com
apb.beauty
selfdefenseandimprovement.com
slr-of.com
nostalgija-sibenik.com
012channel.com
pdms.info
yhhj54.top
szscgz.com
pepsiessence.com
gspleakdetection.com
nephpropulsionsystems.com
pigeonpix.com
universalproviderservicetx.com
tur-v-dagestan.site
iknindia.com
mediacontactservices.com
basslinebeast.net
thinparty.com
nshy.agency
zendflowers.com
ankararuzgarhaliyikama.com
134688703.com
pengshengkeji.com
lequationbasque.com
prednisolone.cfd
menofnyc.com
artfkts.com
njbankruptcy.me
silvblansrl.com
promalehealth.com
futurax.global
yiwajg.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2668-13-0x0000000000400000-0x000000000042B000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2412 set thread context of 2668 2412 vbc.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 3024 2668 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2412 vbc.exe 2412 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2412 wrote to memory of 2668 2412 vbc.exe 29 PID 2668 wrote to memory of 3024 2668 AddInProcess32.exe 30 PID 2668 wrote to memory of 3024 2668 AddInProcess32.exe 30 PID 2668 wrote to memory of 3024 2668 AddInProcess32.exe 30 PID 2668 wrote to memory of 3024 2668 AddInProcess32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 363⤵
- Program crash
PID:3024
-
-