Report - vbc.exe

PE32 PE File
ScreenShot
Created 2021.07.23 09:49 Machine s1_win7_x6401
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
12
Behavior Score
6.2
ZERO API file : malware
VT API (file) 28 detected (AIDetect, malware1, malicious, high confidence, Zusy, Ulise, Unsafe, Save, confidence, 100%, Eldorado, Attribute, HighConfidence, Zbot, Generic ML PUA, ZPACK, ai score=80, VirRansom, score, BScope, Generic@ML, RDML, PNLQcA7FiKlrFB1i4pXUrQ, Static AI, Suspicious PE, ZexaF, hiZ@aGytgdk, QVM20)
md5 422e50c25edd184233d2b19609cb1e05
sha256 7e0c5eb5f18d5313c39c806aeb2ee42b3ca22661c6c1aa2eb0fbead3948f6e26
ssdeep 3072:lchVVVkt2oxTPENDu7RcCUlHfEjXnrs28eDxn4:lc7VGtJTPENqFcCUfEjXrJ5Dx4
imphash ad7593902351b94d30c5d42690419916
impfuzzy 12:8LmkdAH8YHzqN3PPSbo3IpiXzNXWGLNTXnUTXt1RpeXlzeXWqDeXW8+F1VOI/SE6:Knk8bNnSbAI6ZDNbStHpIl8XIc76E7e
  Network IP location

Signature (14cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Harvests information related to installed instant messenger clients
watch Putty Files
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Moves the original executable to a new location
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info Tries to locate where the browsers are installed

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
postmasterupdate.gq Unknown clean

Suricata ids

PE API

IAT(Import Address Table) Library

GDI32.dll
 0x40300c CreateCompatibleDC
 0x403010 SelectObject
 0x403014 SetBoundsRect
 0x403018 GetTextMetricsW
 0x40301c GdiArtificialDecrementDriver
 0x403020 AddFontResourceExA
 0x403024 GetWorldTransform
SHLWAPI.dll
 0x403040 PathCombineW
 0x403044 SHRegOpenUSKeyW
 0x403048 PathIsSystemFolderA
 0x40304c StrNCatW
 0x403050 StrCmpW
 0x403054 PathFindExtensionW
 0x403058 UrlUnescapeA
 0x40305c UrlEscapeW
WINSPOOL.DRV
 0x403064 None
 0x403068 DeviceCapabilitiesA
 0x40306c GetPrinterDataExW
 0x403070 ConfigurePortA
 0x403074 ConnectToPrinterDlg
 0x403078 DevQueryPrint
 0x40307c DeletePrinterDriverA
MSVFW32.dll
 0x40302c None
 0x403030 DrawDibBegin
 0x403034 ICClose
 0x403038 MCIWndCreate
AVIFIL32.dll
 0x403000 AVIStreamOpenFromFileA
 0x403004 AVIMakeStreamFromClipboard

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure