Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
597KB
-
MD5
1bb71f860cac16c4c91c54c3c3265bda
-
SHA1
fd4e4d8c5ca9ee17440d8ba313964ee1f8d689b5
-
SHA256
c9619641b9ca07b139cc64d223eadad4731fcbfce7e0653ce4583b4ea05a686d
-
SHA512
15c40a03d2f6904fad34d34c3448491eb5b6e40246e3a1296c1f366d0a3337570ce94e2b1cb44bf09b6e7e5c18ce54c1c06f802a15c79430ccb1e603be2e1171
-
SSDEEP
12288:srV9sI1blVffLr7oMvuHo8HPrZG94oVMXDcqC/QVI17S:89sI9zE2So8HPoWhlZVw7
Malware Config
Extracted
xloader
2.3
njhr
kyyx666.com
chicasgunsboutique.com
effectivevip.com
xvideoapps.com
mythree-informationupdates.com
concrete-cleaners.com
zxywxmr.com
runreach.com
khoemanh.club
basecampmedics.com
alloneart.com
thepeoplesgauntlet.com
pinkinomanbeauty.com
level60media.com
master.recipes
acadlearning.com
1001voltas.com
bakegeeks.com
fontaine-escargots.com
lushlobes.net
stripia.com
foundyourthing.info
saveursdelaferme.com
antoniolopezmurillo.com
storeralumni.com
blakfri.com
applife.info
recipesfordivineliving.com
nlk-bazis-mail.online
finansalgayrimenkul.com
elegancesuit.com
metrouv.com
sweetlittlegoodthings.com
jumbkprivacy.com
joshjohnson.pro
09012345678.com
assamesets.com
medtrustadvisors.com
patboydpropertiesllc.com
pusatsopsubarashi.com
beaconhillboston.net
gerinus.com
travelchina.store
hsyl272.com
underpressurecare.com
jasminespot.com
homebuyerspa.com
contorig2.com
jmshomestore.com
naturelinekwt.com
letscompile.com
bryanmayor.com
oryzeae.xyz
willysuefarms.com
fmayuttaya.com
digitaldownlinesecrets.com
wantedtrek.com
digitalnaturedc.com
motels2.com
impactxnow.com
edenwholistichealth.com
environm.net
mst-srv.net
stoneautoaces.com
yuanyouwang.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3396-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3396-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4404-22-0x0000000000D30000-0x0000000000D58000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3504 set thread context of 3396 3504 vbc.exe 91 PID 3396 set thread context of 3432 3396 vbc.exe 56 PID 4404 set thread context of 3432 4404 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3396 vbc.exe 3396 vbc.exe 3396 vbc.exe 3396 vbc.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe 4404 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3396 vbc.exe 3396 vbc.exe 3396 vbc.exe 4404 wscript.exe 4404 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3396 vbc.exe Token: SeDebugPrivilege 4404 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3504 wrote to memory of 3396 3504 vbc.exe 91 PID 3432 wrote to memory of 4404 3432 Explorer.EXE 92 PID 3432 wrote to memory of 4404 3432 Explorer.EXE 92 PID 3432 wrote to memory of 4404 3432 Explorer.EXE 92 PID 4404 wrote to memory of 1816 4404 wscript.exe 93 PID 4404 wrote to memory of 1816 4404 wscript.exe 93 PID 4404 wrote to memory of 1816 4404 wscript.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-