Summary | ZeroBOX

vbc.exe

UPX Malicious Library Malicious Packer PE File JPEG Format PE32
Category Machine Started Completed
FILE s1_win7_x6403_us March 20, 2023, 9:47 a.m. March 20, 2023, 10:08 a.m.
Size 516.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 badfd20331bbd073b8efe745d71b4797
SHA256 05b59ecf47b2421de0d6777fbd1498ac5b6c2fc0a8233838e3246195f452175e
CRC32 363499F9
ssdeep 12288:OYfjeJp6VaEn7CCz6U0iibfBDmc55PrY8kxal:OYfjRRneU0iibfBbnY8kxal
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

IP Address Status Action
164.124.101.2 Active Moloch
178.237.33.50 Active Moloch
38.117.65.122 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49165 -> 38.117.65.122:1558 2036594 ET JA3 Hash - Remcos 3.x TLS Connection Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.103:49165
38.117.65.122:1558
None None None

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
suspicious_features GET method with no useragent header suspicious_request GET http://geoplugin.net/json.gp
request GET http://geoplugin.net/json.gp
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2152
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004f2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2152
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00480000
allocation_type: 12289 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
description mvmqykdtoq.exe tried to sleep 465 seconds, actually delayed analysis time by 465 seconds
file C:\Users\test22\AppData\Roaming\nyyv\rbjhkoqfsoc.exe
file C:\Users\test22\AppData\Local\Temp\mvmqykdtoq.exe
file C:\Users\test22\AppData\Roaming\nyyv\rbjhkoqfsoc.exe
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2228
process_handle: 0x00000100
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2228
process_handle: 0x00000100
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2268
process_handle: 0x000000f8
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2268
process_handle: 0x000000f8
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2304
process_handle: 0x00000108
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2304
process_handle: 0x00000108
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2340
process_handle: 0x00000104
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2340
process_handle: 0x00000104
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2376
process_handle: 0x00000100
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2376
process_handle: 0x00000100
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2412
process_handle: 0x000000f8
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2412
process_handle: 0x000000f8
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2448
process_handle: 0x00000108
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2448
process_handle: 0x00000108
1 0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2484
process_handle: 0x00000104
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2484
process_handle: 0x00000104
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\gwfekmplpe reg_value C:\Users\test22\AppData\Roaming\nyyv\rbjhkoqfsoc.exe "C:\Users\test22\AppData\Local\Temp\mvmqykdtoq.exe" C:\Users\test22\AppData\
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x004098a7
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x00400000
1 262593 0
Process injection Process 2152 called NtSetContextThread to modify thread in remote process 2520
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 2005598660
registers.esp: 1899824
registers.edi: 0
registers.eax: 4402970
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000000f8
process_identifier: 2520
1 0 0
Lionic Trojan.Win32.Agent.tshg
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.65983360
FireEye Generic.mg.badfd20331bbd073
CAT-QuickHeal Backdoor.Remcos
ALYac Trojan.GenericKD.65983360
Cylance unsafe
VIPRE Trojan.GenericKD.65983360
K7AntiVirus Trojan ( 005a0df81 )
Alibaba Trojan:Win32/Injector.fcd9fd12
K7GW Trojan ( 005a0df81 )
CrowdStrike win/malicious_confidence_100% (W)
Cyren W32/Injector.SZDO-0098
Symantec Packed.NSISPacker!g14
ESET-NOD32 a variant of Win32/Injector.ESUJ
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Backdoor.Win32.Remcos.gen
BitDefender Trojan.GenericKD.65983360
NANO-Antivirus Trojan.Win32.Loader.jvfuwy
Avast Win32:InjectorX-gen [Trj]
Emsisoft Trojan.GenericKD.65983360 (B)
DrWeb Trojan.Loader.1342
TrendMicro TROJ_GEN.R002C0PCH23
McAfee-GW-Edition BehavesLike.Win32.Generic.hc
SentinelOne Static AI - Suspicious PE
Webroot W32.Trojan.NSISX.Spy
Google Detected
Avira TR/Redcap.hkbix
MAX malware (ai score=88)
Antiy-AVL Trojan/Win32.Injector
Gridinsoft Trojan.Win32.Remcos.bot
Arcabit Trojan.Generic.D3EED380
ViRobot Trojan.Win.Z.Injector.529147
ZoneAlarm HEUR:Backdoor.Win32.Remcos.gen
GData Trojan.GenericKD.65983360
Cynet Malicious (score: 100)
McAfee Artemis!BADFD20331BB
VBA32 Trojan.Loader
Malwarebytes Trojan.Injector
Zoner Trojan.Win32.154456
TrendMicro-HouseCall TROJ_GEN.R002C0PCH23
Rising Trojan.Injector!8.C4 (TFE:5:GfohncgtHcJ)
Yandex Trojan.Injector!IGnfEhD5l2Y
Ikarus Trojan.Inject
Fortinet W32/Injector.ESTE!tr
BitDefenderTheta Gen:NN.ZexaCO.36344.dqW@aSUGePb
AVG Win32:InjectorX-gen [Trj]
Panda Trj/CI.A