Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
aoo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aoo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
821KB
-
MD5
d41735b66e58ebee18f4326df912e28b
-
SHA1
6ee2222ee26abd42c1112841975d2ecc2b09d0c6
-
SHA256
41fd6b520a4abc453b23329a134e661c39aa19b463dc28bfcbf52bf093661511
-
SHA512
40d7c1b90d61eecad860d040d03ef7c3a2ec67bd263f2f1d389ade99655dbd5c567983483c48e0b418d9ded7ced1eece6cc26baa75ce43413ebf520ce339dc15
-
SSDEEP
12288:vFvomht5eIvL6PIJFGMBwbNxZWgT2mn/N4ljTI8Lf8MWakiyfIXy6fsEa:tvvsWweFlBUWg/4lXuFWi6EE
Malware Config
Extracted
xloader
2.5
dgrg
iot-vn.com
gamiteisnowjoyned.com
ak8flfqzm8.com
daliborkokic.com
mrk-9.com
tanzibkarate.quest
mburmtdvccti.mobi
thomas-wildlife-control.com
thebritenseries.com
hkkbags.com
redenyl.com
resilientbutterfly.com
nicethelab.com
xn--1lq90isray30ltdc.xn--czru2d
cyberews.net
naclepin2a.xyz
rodrigocoppa.com
hightings.com
chamaaibrasil.com
bdelsaer.com
directmail411.com
nropes.com
nnhhhhnn5.net
silverhavenfinance.com
absolutenuisance.com
pvu1863.com
arrow-electronics-corps.net
gelsinpremium.com
glistonshop.com
needscooters.com
camaras.store
global-forbes.biz
thesuvidhastore.com
baysidecanton.com
data-schwab.com
1w3.space
roofrepairnow.info
thruzens.com
ydbsy.com
timothykmyers.store
best-eternal.com
balanzaseconomicas.com
regitconference.com
whatsappstatus17.com
tdetesla.com
schneex.store
maktabarasheedia.online
tipshalal.net
tinawcounseling.com
mpu-vermittlung.com
airtogether.com
operationservefirst.com
itsajinkyaraj.xyz
doctorsby.com
datemyso.com
fruittys.com
urnam.com
paprikaproduksiyon.com
profitablemechanic.com
townsvillelawnservice.com
cryptoclits.club
retellinn.com
paijuluntan.com
temaksa.com
honeyroux.com
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions vbc.exe -
Xloader payload 3 IoCs
resource yara_rule behavioral4/memory/852-12-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral4/memory/852-15-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral4/memory/2260-25-0x0000000000520000-0x0000000000549000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools vbc.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4028 set thread context of 852 4028 vbc.exe 84 PID 852 set thread context of 3540 852 msinfo32.exe 56 PID 2260 set thread context of 3540 2260 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 4028 vbc.exe 852 msinfo32.exe 852 msinfo32.exe 852 msinfo32.exe 852 msinfo32.exe 4028 vbc.exe 4028 vbc.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 852 msinfo32.exe 852 msinfo32.exe 852 msinfo32.exe 2260 rundll32.exe 2260 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4028 vbc.exe Token: SeDebugPrivilege 852 msinfo32.exe Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE Token: SeDebugPrivilege 2260 rundll32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 4028 wrote to memory of 852 4028 vbc.exe 84 PID 3540 wrote to memory of 2260 3540 Explorer.EXE 85 PID 3540 wrote to memory of 2260 3540 Explorer.EXE 85 PID 3540 wrote to memory of 2260 3540 Explorer.EXE 85 PID 2260 wrote to memory of 5076 2260 rundll32.exe 92 PID 2260 wrote to memory of 5076 2260 rundll32.exe 92 PID 2260 wrote to memory of 5076 2260 rundll32.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\msinfo32.exe"C:\Windows\SysWOW64\msinfo32.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\msinfo32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5076
-
-