Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
aoo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aoo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
821KB
-
MD5
d41735b66e58ebee18f4326df912e28b
-
SHA1
6ee2222ee26abd42c1112841975d2ecc2b09d0c6
-
SHA256
41fd6b520a4abc453b23329a134e661c39aa19b463dc28bfcbf52bf093661511
-
SHA512
40d7c1b90d61eecad860d040d03ef7c3a2ec67bd263f2f1d389ade99655dbd5c567983483c48e0b418d9ded7ced1eece6cc26baa75ce43413ebf520ce339dc15
-
SSDEEP
12288:vFvomht5eIvL6PIJFGMBwbNxZWgT2mn/N4ljTI8Lf8MWakiyfIXy6fsEa:tvvsWweFlBUWg/4lXuFWi6EE
Malware Config
Extracted
xloader
2.5
dgrg
iot-vn.com
gamiteisnowjoyned.com
ak8flfqzm8.com
daliborkokic.com
mrk-9.com
tanzibkarate.quest
mburmtdvccti.mobi
thomas-wildlife-control.com
thebritenseries.com
hkkbags.com
redenyl.com
resilientbutterfly.com
nicethelab.com
xn--1lq90isray30ltdc.xn--czru2d
cyberews.net
naclepin2a.xyz
rodrigocoppa.com
hightings.com
chamaaibrasil.com
bdelsaer.com
directmail411.com
nropes.com
nnhhhhnn5.net
silverhavenfinance.com
absolutenuisance.com
pvu1863.com
arrow-electronics-corps.net
gelsinpremium.com
glistonshop.com
needscooters.com
camaras.store
global-forbes.biz
thesuvidhastore.com
baysidecanton.com
data-schwab.com
1w3.space
roofrepairnow.info
thruzens.com
ydbsy.com
timothykmyers.store
best-eternal.com
balanzaseconomicas.com
regitconference.com
whatsappstatus17.com
tdetesla.com
schneex.store
maktabarasheedia.online
tipshalal.net
tinawcounseling.com
mpu-vermittlung.com
airtogether.com
operationservefirst.com
itsajinkyaraj.xyz
doctorsby.com
datemyso.com
fruittys.com
urnam.com
paprikaproduksiyon.com
profitablemechanic.com
townsvillelawnservice.com
cryptoclits.club
retellinn.com
paijuluntan.com
temaksa.com
honeyroux.com
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions vbc.exe -
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/2904-12-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral3/memory/2904-8-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral3/memory/2904-15-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral3/memory/2980-21-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools vbc.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3016 set thread context of 2904 3016 vbc.exe 31 PID 2904 set thread context of 1196 2904 wininit.exe 21 PID 2980 set thread context of 1196 2980 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 3016 vbc.exe 2904 wininit.exe 2904 wininit.exe 3016 vbc.exe 3016 vbc.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe 2980 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2904 wininit.exe 2904 wininit.exe 2904 wininit.exe 2980 wscript.exe 2980 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3016 vbc.exe Token: SeDebugPrivilege 2904 wininit.exe Token: SeDebugPrivilege 2980 wscript.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 3016 wrote to memory of 2904 3016 vbc.exe 31 PID 1196 wrote to memory of 2980 1196 Explorer.EXE 52 PID 1196 wrote to memory of 2980 1196 Explorer.EXE 52 PID 1196 wrote to memory of 2980 1196 Explorer.EXE 52 PID 1196 wrote to memory of 2980 1196 Explorer.EXE 52 PID 2980 wrote to memory of 1792 2980 wscript.exe 53 PID 2980 wrote to memory of 1792 2980 wscript.exe 53 PID 2980 wrote to memory of 1792 2980 wscript.exe 53 PID 2980 wrote to memory of 1792 2980 wscript.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2676
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2720
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2816
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2596
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2828
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2868
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2600
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1732
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2724
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2820
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2560
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2564
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2572
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2636
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2680
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2972
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\wininit.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-