Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20240903-en
General
-
Target
vbc.exe
-
Size
632KB
-
MD5
2350899dd0c4a9d7f8440310978e6250
-
SHA1
d2111c37f59496d195689c2ab060a7057ea5ecf5
-
SHA256
ceeda4a7a306ccc5a4606ff794950469392130188f5a5a7df1b81562ab021d42
-
SHA512
c4780298c5dbed24575900c0992f5efd6ad6504682a270bcb038ffc28e076ade9f95252bcb89723f312131b5ca3089d7209f51b1cae8de29b5d3d02b32ed131b
-
SSDEEP
12288:wQT9s31JoQ2juBhV0jr38DBMQpD9h3DLQ2Lx9xLd:wQT9s38fjuFG89nZn
Malware Config
Extracted
formbook
4.1
p6ai
ocfoundation.info
fullhouse01.com
a-great-lexus-rx.fyi
googlepayperclick.com
coachmyragolden.com
luxclothing.club
medicationbuddy.com
miraclepawsfoundation.com
datingforcez.online
wasteharvester.com
solslides.com
hotel-ritterhof.com
tianjinsf.com
receiveyourcashnow.com
the-vma.com
godrejroyalewoodsbangalore.com
erickrokanphotography.com
vasinvestments.com
janlago.com
2nocent.com
grasipy.com
generic5menviav.com
siokan.com
trump-single.com
betweentheadvents.com
huellitasdecleo.com
callaido.com
jfl-info.net
associationuniversity.com
fashionclogstops.com
tlscert.watch
maxenvio4.online
rugpat.com
aerialconsult.com
rwtcjd.com
thevirtualeventz.com
kuyili.net
tiendapatina.com
samcartt.com
tacotourtexas.com
kindermap.com
kofc2458.com
learnavstandards.com
independentthirdparty.com
vanessabruno.club
urbanaffirmation-active.com
uniquelykay.com
micondolencias.com
thehaircandi.com
dfshelf.com
beautifullivesmatter.info
tea.coffee
pickleballpainmanagement.com
kci-sh.com
vzhizuo.com
edubox24.store
emridoc.com
fashpark.com
irishebikes.com
natalyashelk.online
kpassan.com
eranratzon.com
femueweczedre.com
bastianbrown.com
bookkeeping32.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2136-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2136-6-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3092 set thread context of 2136 3092 vbc.exe 83 PID 2136 set thread context of 3520 2136 vbc.exe 56 PID 3988 set thread context of 3520 3988 cscript.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 1176 3092 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2136 vbc.exe 2136 vbc.exe 2136 vbc.exe 2136 vbc.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe 3988 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3092 vbc.exe 2136 vbc.exe 2136 vbc.exe 2136 vbc.exe 3988 cscript.exe 3988 cscript.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2136 vbc.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeDebugPrivilege 3988 cscript.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3092 wrote to memory of 2136 3092 vbc.exe 83 PID 3092 wrote to memory of 2136 3092 vbc.exe 83 PID 3092 wrote to memory of 2136 3092 vbc.exe 83 PID 3092 wrote to memory of 2136 3092 vbc.exe 83 PID 3520 wrote to memory of 3988 3520 Explorer.EXE 87 PID 3520 wrote to memory of 3988 3520 Explorer.EXE 87 PID 3520 wrote to memory of 3988 3520 Explorer.EXE 87 PID 3988 wrote to memory of 2772 3988 cscript.exe 88 PID 3988 wrote to memory of 2772 3988 cscript.exe 88 PID 3988 wrote to memory of 2772 3988 cscript.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 3803⤵
- Program crash
PID:1176
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3092 -ip 30921⤵PID:5108