Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
404KB
-
MD5
cf82630b65d8e29c59fd6254c1bb8df3
-
SHA1
023d37e9bf3a4f0af07e23db3630fb023902d9aa
-
SHA256
1ccf632888b773e7116eb3a4ade6017f064b5c98f71424e5c1cc8b4bcbe181ef
-
SHA512
095f653f4ba57019e781ff6b065a76c193c1987c94ab9dbfb24014f45a3cb06d3cafde51623002ba0c1a920f007ca26129fc7437db3777b74ac14d9f39ddc9ea
-
SSDEEP
12288:m1hpgPSDfOvZXBo1zMrLRQVjvf00t3/34s3ujfkXX:m17gwz6ob3P34aujI
Malware Config
Extracted
xloader
2.5
scb0
introlly.com
slowtravelco.com
sasanos.com
3424soldbastrophwy.com
isabelaefernando.net
0754fm.com
meta-bot.xyz
778tt8.com
krallechols.quest
lipagent.com
dermaqueeniran.com
psychoterapeuta-wroclaw.com
marmorariapiramide.online
luxonealbery.com
floridawp.com
nebobuild.com
facillitiespro-sweep.com
wwgzj.com
puffsmoke.online
cryptofuelcars.com
mcintoshsonoystercompany.com
viscoent.online
daveparkernotary.com
publicschools.fail
traexcel.com
lovelypersonals.com
emptycc.net
omniriot.com
etsawi9.com
rangerbuddys.com
medchemic.com
paparazziprom.com
atelifer.com
imlgw.com
vaguva.com
theportlandhandyman.com
oggu2.com
fuchs-consolidated.net
onluo.com
flirtylocals.xyz
foxyladynails.com
dgyej.com
cloudmaigc.com
lafabriqueabeille.com
vivagru.com
fuckingmom88.xyz
caesarscssino.com
jyh8882.com
diyiyc.com
lanceseuexpert.digital
omshivematka.com
agrigain-soil.com
burgettflorist.com
goddarddrillingllc.com
nchh07.xyz
tabulose-paare.com
notlficationintuit.com
killercross.com
storybylightstudio.com
flex-ecommerce.com
fearlessthread.com
skateboardlovers.com
mgav34.xyz
lucanos.info
vetpipes.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2400-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2400-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2780-21-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1924 set thread context of 2400 1924 vbc.exe 31 PID 2400 set thread context of 1208 2400 vbc.exe 21 PID 2780 set thread context of 1208 2780 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2400 vbc.exe 2400 vbc.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe 2780 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2400 vbc.exe 2400 vbc.exe 2400 vbc.exe 2780 help.exe 2780 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2400 vbc.exe Token: SeDebugPrivilege 2780 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1924 wrote to memory of 2400 1924 vbc.exe 31 PID 1208 wrote to memory of 2780 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2780 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2780 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2780 1208 Explorer.EXE 32 PID 2780 wrote to memory of 2692 2780 help.exe 33 PID 2780 wrote to memory of 2692 2780 help.exe 33 PID 2780 wrote to memory of 2692 2780 help.exe 33 PID 2780 wrote to memory of 2692 2780 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
-