Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
597KB
-
MD5
1bb71f860cac16c4c91c54c3c3265bda
-
SHA1
fd4e4d8c5ca9ee17440d8ba313964ee1f8d689b5
-
SHA256
c9619641b9ca07b139cc64d223eadad4731fcbfce7e0653ce4583b4ea05a686d
-
SHA512
15c40a03d2f6904fad34d34c3448491eb5b6e40246e3a1296c1f366d0a3337570ce94e2b1cb44bf09b6e7e5c18ce54c1c06f802a15c79430ccb1e603be2e1171
-
SSDEEP
12288:srV9sI1blVffLr7oMvuHo8HPrZG94oVMXDcqC/QVI17S:89sI9zE2So8HPoWhlZVw7
Malware Config
Extracted
xloader
2.3
njhr
kyyx666.com
chicasgunsboutique.com
effectivevip.com
xvideoapps.com
mythree-informationupdates.com
concrete-cleaners.com
zxywxmr.com
runreach.com
khoemanh.club
basecampmedics.com
alloneart.com
thepeoplesgauntlet.com
pinkinomanbeauty.com
level60media.com
master.recipes
acadlearning.com
1001voltas.com
bakegeeks.com
fontaine-escargots.com
lushlobes.net
stripia.com
foundyourthing.info
saveursdelaferme.com
antoniolopezmurillo.com
storeralumni.com
blakfri.com
applife.info
recipesfordivineliving.com
nlk-bazis-mail.online
finansalgayrimenkul.com
elegancesuit.com
metrouv.com
sweetlittlegoodthings.com
jumbkprivacy.com
joshjohnson.pro
09012345678.com
assamesets.com
medtrustadvisors.com
patboydpropertiesllc.com
pusatsopsubarashi.com
beaconhillboston.net
gerinus.com
travelchina.store
hsyl272.com
underpressurecare.com
jasminespot.com
homebuyerspa.com
contorig2.com
jmshomestore.com
naturelinekwt.com
letscompile.com
bryanmayor.com
oryzeae.xyz
willysuefarms.com
fmayuttaya.com
digitaldownlinesecrets.com
wantedtrek.com
digitalnaturedc.com
motels2.com
impactxnow.com
edenwholistichealth.com
environm.net
mst-srv.net
stoneautoaces.com
yuanyouwang.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2788-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2788-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2012-23-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2504 set thread context of 2788 2504 vbc.exe 32 PID 2788 set thread context of 1184 2788 vbc.exe 21 PID 2012 set thread context of 1184 2012 wininit.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2788 vbc.exe 2788 vbc.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe 2012 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2788 vbc.exe 2788 vbc.exe 2788 vbc.exe 2012 wininit.exe 2012 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2788 vbc.exe Token: SeDebugPrivilege 2012 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 2504 wrote to memory of 2788 2504 vbc.exe 32 PID 1184 wrote to memory of 2012 1184 Explorer.EXE 33 PID 1184 wrote to memory of 2012 1184 Explorer.EXE 33 PID 1184 wrote to memory of 2012 1184 Explorer.EXE 33 PID 1184 wrote to memory of 2012 1184 Explorer.EXE 33 PID 2012 wrote to memory of 2016 2012 wininit.exe 34 PID 2012 wrote to memory of 2016 2012 wininit.exe 34 PID 2012 wrote to memory of 2016 2012 wininit.exe 34 PID 2012 wrote to memory of 2016 2012 wininit.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2016
-
-