ScreenShot
Created | 2021.08.19 09:44 | Machine | s1_win7_x6401 |
Filename | vbc.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 46 detected (Noon, malicious, high confidence, GenericKD, Save, runner, ali1000123, Kryptik, Eldorado, Attribute, HighConfidence, HMCU, Blocker, FileRepMetagen, Auto, HPGen, Unsafe, Score, STOP, se37341, StopCrypt, CoinMiner, Glupteba, R437681, ZexaF, sq1@amDvdhpG, ai score=86, BScope, CLASSIC, Static AI, Suspicious PE, susgen, GenKryptik, FJBW, confidence, 100%, HwoCUugA) | ||
md5 | 46b2b8e7621a93ae6b876b071da55212 | ||
sha256 | 9da4d8126ac0c4c0b68066407e24cf1a36e06f0fc22ef87b0a464f90c1374095 | ||
ssdeep | 6144:0zAfLQsyTvBg96hLshzuKd4lNC0wxkBl0:3LITa6SJuwaB | ||
imphash | 477c037bd85187d535326c948fa8e5de | ||
impfuzzy | 48:XPInZyq/tfXd/lScgYzrJtn6LQcYv0H1Vs:XP4xtl9SczzrJtnQQcYcH1K |
Network IP location
Signature (17cnts)
Level | Description |
---|---|
danger | File has been identified by 46 AntiVirus engines on VirusTotal as malicious |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks if process is being debugged by a debugger |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (12cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
Network (11cnts) ?
Suricata ids
ET MALWARE FormBook CnC Checkin (GET)
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x431008 lstrlenA
0x43100c EnumDateFormatsExW
0x431010 WriteConsoleOutputW
0x431014 InterlockedIncrement
0x431018 GetConsoleAliasA
0x43101c InterlockedDecrement
0x431020 WritePrivateProfileSectionA
0x431024 GetSystemWindowsDirectoryW
0x431028 GetEnvironmentStringsW
0x43102c GetUserDefaultLCID
0x431030 WriteConsoleInputA
0x431034 GetComputerNameW
0x431038 SetEvent
0x43103c GetConsoleAliasesLengthA
0x431040 GetConsoleTitleA
0x431044 CreateActCtxW
0x431048 InitializeCriticalSection
0x43104c GetConsoleCP
0x431050 GetVersionExW
0x431054 DnsHostnameToComputerNameW
0x431058 lstrcpynW
0x43105c SetConsoleCursorPosition
0x431060 GetFileAttributesW
0x431064 VerifyVersionInfoA
0x431068 HeapQueryInformation
0x43106c IsBadWritePtr
0x431070 GetCompressedFileSizeA
0x431074 GetSystemDirectoryA
0x431078 CreateFileW
0x43107c lstrcatA
0x431080 GetACP
0x431084 GetVolumePathNameA
0x431088 FlushFileBuffers
0x43108c InterlockedExchange
0x431090 GetLastError
0x431094 GetProcAddress
0x431098 PeekConsoleInputW
0x43109c CreateTimerQueueTimer
0x4310a0 LocalLock
0x4310a4 GetConsoleDisplayMode
0x4310a8 EnterCriticalSection
0x4310ac SetTimerQueueTimer
0x4310b0 GetLocalTime
0x4310b4 WriteConsoleA
0x4310b8 LocalAlloc
0x4310bc DeleteTimerQueue
0x4310c0 CreateTapePartition
0x4310c4 BeginUpdateResourceA
0x4310c8 GlobalGetAtomNameW
0x4310cc WaitForMultipleObjects
0x4310d0 SetEnvironmentVariableA
0x4310d4 GetModuleFileNameA
0x4310d8 GetModuleHandleA
0x4310dc WriteConsoleOutputAttribute
0x4310e0 EndUpdateResourceA
0x4310e4 ReadConsoleInputW
0x4310e8 FindFirstVolumeW
0x4310ec GetCurrentProcessId
0x4310f0 AreFileApisANSI
0x4310f4 LCMapStringW
0x4310f8 GetSystemDefaultLangID
0x4310fc UnhandledExceptionFilter
0x431100 SetUnhandledExceptionFilter
0x431104 HeapReAlloc
0x431108 HeapAlloc
0x43110c GetModuleHandleW
0x431110 Sleep
0x431114 ExitProcess
0x431118 GetCommandLineA
0x43111c GetStartupInfoA
0x431120 WriteFile
0x431124 GetStdHandle
0x431128 TlsGetValue
0x43112c TlsAlloc
0x431130 TlsSetValue
0x431134 TlsFree
0x431138 SetLastError
0x43113c GetCurrentThreadId
0x431140 DeleteCriticalSection
0x431144 LeaveCriticalSection
0x431148 HeapCreate
0x43114c VirtualFree
0x431150 HeapFree
0x431154 VirtualAlloc
0x431158 TerminateProcess
0x43115c GetCurrentProcess
0x431160 IsDebuggerPresent
0x431164 LoadLibraryA
0x431168 InitializeCriticalSectionAndSpinCount
0x43116c FreeEnvironmentStringsA
0x431170 GetEnvironmentStrings
0x431174 FreeEnvironmentStringsW
0x431178 WideCharToMultiByte
0x43117c SetHandleCount
0x431180 GetFileType
0x431184 QueryPerformanceCounter
0x431188 GetTickCount
0x43118c GetSystemTimeAsFileTime
0x431190 RaiseException
0x431194 GetCPInfo
0x431198 GetOEMCP
0x43119c IsValidCodePage
0x4311a0 RtlUnwind
0x4311a4 HeapSize
0x4311a8 GetLocaleInfoA
0x4311ac GetStringTypeA
0x4311b0 MultiByteToWideChar
0x4311b4 GetStringTypeW
0x4311b8 LCMapStringA
USER32.dll
0x4311c0 RealGetWindowClassA
ADVAPI32.dll
0x431000 AdjustTokenGroups
EAT(Export Address Table) Library
0x401003 @GetAnotherVice@12
0x401000 @SetFirstEverVice@4
KERNEL32.dll
0x431008 lstrlenA
0x43100c EnumDateFormatsExW
0x431010 WriteConsoleOutputW
0x431014 InterlockedIncrement
0x431018 GetConsoleAliasA
0x43101c InterlockedDecrement
0x431020 WritePrivateProfileSectionA
0x431024 GetSystemWindowsDirectoryW
0x431028 GetEnvironmentStringsW
0x43102c GetUserDefaultLCID
0x431030 WriteConsoleInputA
0x431034 GetComputerNameW
0x431038 SetEvent
0x43103c GetConsoleAliasesLengthA
0x431040 GetConsoleTitleA
0x431044 CreateActCtxW
0x431048 InitializeCriticalSection
0x43104c GetConsoleCP
0x431050 GetVersionExW
0x431054 DnsHostnameToComputerNameW
0x431058 lstrcpynW
0x43105c SetConsoleCursorPosition
0x431060 GetFileAttributesW
0x431064 VerifyVersionInfoA
0x431068 HeapQueryInformation
0x43106c IsBadWritePtr
0x431070 GetCompressedFileSizeA
0x431074 GetSystemDirectoryA
0x431078 CreateFileW
0x43107c lstrcatA
0x431080 GetACP
0x431084 GetVolumePathNameA
0x431088 FlushFileBuffers
0x43108c InterlockedExchange
0x431090 GetLastError
0x431094 GetProcAddress
0x431098 PeekConsoleInputW
0x43109c CreateTimerQueueTimer
0x4310a0 LocalLock
0x4310a4 GetConsoleDisplayMode
0x4310a8 EnterCriticalSection
0x4310ac SetTimerQueueTimer
0x4310b0 GetLocalTime
0x4310b4 WriteConsoleA
0x4310b8 LocalAlloc
0x4310bc DeleteTimerQueue
0x4310c0 CreateTapePartition
0x4310c4 BeginUpdateResourceA
0x4310c8 GlobalGetAtomNameW
0x4310cc WaitForMultipleObjects
0x4310d0 SetEnvironmentVariableA
0x4310d4 GetModuleFileNameA
0x4310d8 GetModuleHandleA
0x4310dc WriteConsoleOutputAttribute
0x4310e0 EndUpdateResourceA
0x4310e4 ReadConsoleInputW
0x4310e8 FindFirstVolumeW
0x4310ec GetCurrentProcessId
0x4310f0 AreFileApisANSI
0x4310f4 LCMapStringW
0x4310f8 GetSystemDefaultLangID
0x4310fc UnhandledExceptionFilter
0x431100 SetUnhandledExceptionFilter
0x431104 HeapReAlloc
0x431108 HeapAlloc
0x43110c GetModuleHandleW
0x431110 Sleep
0x431114 ExitProcess
0x431118 GetCommandLineA
0x43111c GetStartupInfoA
0x431120 WriteFile
0x431124 GetStdHandle
0x431128 TlsGetValue
0x43112c TlsAlloc
0x431130 TlsSetValue
0x431134 TlsFree
0x431138 SetLastError
0x43113c GetCurrentThreadId
0x431140 DeleteCriticalSection
0x431144 LeaveCriticalSection
0x431148 HeapCreate
0x43114c VirtualFree
0x431150 HeapFree
0x431154 VirtualAlloc
0x431158 TerminateProcess
0x43115c GetCurrentProcess
0x431160 IsDebuggerPresent
0x431164 LoadLibraryA
0x431168 InitializeCriticalSectionAndSpinCount
0x43116c FreeEnvironmentStringsA
0x431170 GetEnvironmentStrings
0x431174 FreeEnvironmentStringsW
0x431178 WideCharToMultiByte
0x43117c SetHandleCount
0x431180 GetFileType
0x431184 QueryPerformanceCounter
0x431188 GetTickCount
0x43118c GetSystemTimeAsFileTime
0x431190 RaiseException
0x431194 GetCPInfo
0x431198 GetOEMCP
0x43119c IsValidCodePage
0x4311a0 RtlUnwind
0x4311a4 HeapSize
0x4311a8 GetLocaleInfoA
0x4311ac GetStringTypeA
0x4311b0 MultiByteToWideChar
0x4311b4 GetStringTypeW
0x4311b8 LCMapStringA
USER32.dll
0x4311c0 RealGetWindowClassA
ADVAPI32.dll
0x431000 AdjustTokenGroups
EAT(Export Address Table) Library
0x401003 @GetAnotherVice@12
0x401000 @SetFirstEverVice@4