Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
632KB
-
MD5
2350899dd0c4a9d7f8440310978e6250
-
SHA1
d2111c37f59496d195689c2ab060a7057ea5ecf5
-
SHA256
ceeda4a7a306ccc5a4606ff794950469392130188f5a5a7df1b81562ab021d42
-
SHA512
c4780298c5dbed24575900c0992f5efd6ad6504682a270bcb038ffc28e076ade9f95252bcb89723f312131b5ca3089d7209f51b1cae8de29b5d3d02b32ed131b
-
SSDEEP
12288:wQT9s31JoQ2juBhV0jr38DBMQpD9h3DLQ2Lx9xLd:wQT9s38fjuFG89nZn
Malware Config
Extracted
formbook
4.1
p6ai
ocfoundation.info
fullhouse01.com
a-great-lexus-rx.fyi
googlepayperclick.com
coachmyragolden.com
luxclothing.club
medicationbuddy.com
miraclepawsfoundation.com
datingforcez.online
wasteharvester.com
solslides.com
hotel-ritterhof.com
tianjinsf.com
receiveyourcashnow.com
the-vma.com
godrejroyalewoodsbangalore.com
erickrokanphotography.com
vasinvestments.com
janlago.com
2nocent.com
grasipy.com
generic5menviav.com
siokan.com
trump-single.com
betweentheadvents.com
huellitasdecleo.com
callaido.com
jfl-info.net
associationuniversity.com
fashionclogstops.com
tlscert.watch
maxenvio4.online
rugpat.com
aerialconsult.com
rwtcjd.com
thevirtualeventz.com
kuyili.net
tiendapatina.com
samcartt.com
tacotourtexas.com
kindermap.com
kofc2458.com
learnavstandards.com
independentthirdparty.com
vanessabruno.club
urbanaffirmation-active.com
uniquelykay.com
micondolencias.com
thehaircandi.com
dfshelf.com
beautifullivesmatter.info
tea.coffee
pickleballpainmanagement.com
kci-sh.com
vzhizuo.com
edubox24.store
emridoc.com
fashpark.com
irishebikes.com
natalyashelk.online
kpassan.com
eranratzon.com
femueweczedre.com
bastianbrown.com
bookkeeping32.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/3012-3-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 3012 2228 vbc.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1308 3012 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2228 vbc.exe 2228 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3012 2228 vbc.exe 30 PID 2228 wrote to memory of 3012 2228 vbc.exe 30 PID 2228 wrote to memory of 3012 2228 vbc.exe 30 PID 2228 wrote to memory of 3012 2228 vbc.exe 30 PID 2228 wrote to memory of 3012 2228 vbc.exe 30 PID 3012 wrote to memory of 1308 3012 vbc.exe 31 PID 3012 wrote to memory of 1308 3012 vbc.exe 31 PID 3012 wrote to memory of 1308 3012 vbc.exe 31 PID 3012 wrote to memory of 1308 3012 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 363⤵
- Program crash
PID:1308
-
-