ScreenShot
Created | 2021.09.19 10:47 | Machine | s1_win7_x6402 |
Filename | vbc.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 49 detected (AIDetect, malware2, Noon, malicious, high confidence, GenericKD, Unsafe, Kryptik, confidence, 100%, runner, ali1000123, ZexaF, AuW@a4NXnlgi, Eldorado, Attribute, HighConfidence, HMLW, Agensla, PWSX, HPGen, Swotter, ubzii, ASMalwS, PSWTroj, kcloud, Lokibot, FormBook, 3OKMJ2, score, R441406, BScope, ai score=88, AgentTesla, CLASSIC, Static AI, Suspicious PE, GenKryptik, FIBB) | ||
md5 | 866d1aeb69daac5e6e4dda938edf8d26 | ||
sha256 | a41ba93183d03c4cf6b138170fab1d15c306918bb4acd1c2cbc3ee53765e5564 | ||
ssdeep | 6144:/djoID05m/fkLNac4hxSuceQ9cj0/hPhQm5TViEPReg4u5FZwkXZtNdRE1EcyDog:yX5krHQ9O0hPS6J4u5vwkTNj0E7cSdB | ||
imphash | b5f90103145ddd0d0ed4aa0e2fe63de8 | ||
impfuzzy | 48:69D2Z0mSNuhmMYM9cSCtRIc9eqN3qIxQ4W:6p+wNQmXqcSCtRIcl3qIO |
Network IP location
Signature (8cnts)
Level | Description |
---|---|
danger | File has been identified by 49 AntiVirus engines on VirusTotal as malicious |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (41cnts) ?
Suricata ids
ET MALWARE FormBook CnC Checkin (GET)
PE API
IAT(Import Address Table) Library
IMM32.dll
0x42c020 ImmDisableIME
0x42c024 ImmEscapeW
0x42c028 ImmGetRegisterWordStyleA
0x42c02c ImmNotifyIME
0x42c030 ImmSetCompositionFontW
KERNEL32.dll
0x42c038 VirtualProtect
0x42c03c CloseHandle
0x42c040 WriteConsoleW
0x42c044 SetFilePointerEx
0x42c048 SetStdHandle
0x42c04c GetConsoleMode
0x42c050 GetConsoleCP
0x42c054 FlushFileBuffers
0x42c058 EnumSystemLocalesW
0x42c05c GetUserDefaultLCID
0x42c060 IsValidLocale
0x42c064 GetLocaleInfoW
0x42c068 LCMapStringW
0x42c06c CompareStringW
0x42c070 GetTimeFormatW
0x42c074 GetDateFormatW
0x42c078 HeapSize
0x42c07c GetStringTypeW
0x42c080 HeapReAlloc
0x42c084 HeapAlloc
0x42c088 OutputDebugStringW
0x42c08c RtlUnwind
0x42c090 LoadLibraryExW
0x42c094 FreeLibrary
0x42c098 SetConsoleCtrlHandler
0x42c09c GetCommandLineA
0x42c0a0 GetLastError
0x42c0a4 SetLastError
0x42c0a8 GetCurrentThread
0x42c0ac GetCurrentThreadId
0x42c0b0 EncodePointer
0x42c0b4 DecodePointer
0x42c0b8 ExitProcess
0x42c0bc GetModuleHandleExW
0x42c0c0 GetProcAddress
0x42c0c4 AreFileApisANSI
0x42c0c8 MultiByteToWideChar
0x42c0cc WideCharToMultiByte
0x42c0d0 GetProcessHeap
0x42c0d4 GetStdHandle
0x42c0d8 GetFileType
0x42c0dc DeleteCriticalSection
0x42c0e0 GetStartupInfoW
0x42c0e4 GetModuleFileNameA
0x42c0e8 WriteFile
0x42c0ec GetModuleFileNameW
0x42c0f0 QueryPerformanceCounter
0x42c0f4 GetCurrentProcessId
0x42c0f8 GetSystemTimeAsFileTime
0x42c0fc GetEnvironmentStringsW
0x42c100 FreeEnvironmentStringsW
0x42c104 UnhandledExceptionFilter
0x42c108 SetUnhandledExceptionFilter
0x42c10c InitializeCriticalSectionAndSpinCount
0x42c110 CreateEventW
0x42c114 Sleep
0x42c118 GetCurrentProcess
0x42c11c TerminateProcess
0x42c120 TlsAlloc
0x42c124 TlsGetValue
0x42c128 TlsSetValue
0x42c12c TlsFree
0x42c130 GetTickCount
0x42c134 GetModuleHandleW
0x42c138 CreateSemaphoreW
0x42c13c EnterCriticalSection
0x42c140 LeaveCriticalSection
0x42c144 FatalAppExitA
0x42c148 HeapFree
0x42c14c IsValidCodePage
0x42c150 GetACP
0x42c154 GetOEMCP
0x42c158 GetCPInfo
0x42c15c IsDebuggerPresent
0x42c160 IsProcessorFeaturePresent
0x42c164 CreateFileW
GDI32.dll
0x42c000 GetLogColorSpaceW
0x42c004 SelectClipPath
0x42c008 GetLogColorSpaceA
0x42c00c Rectangle
0x42c010 SetTextCharacterExtra
0x42c014 GetViewportOrgEx
0x42c018 RemoveFontResourceExW
msi.dll
0x42c1ac None
0x42c1b0 None
0x42c1b4 None
0x42c1b8 None
0x42c1bc None
0x42c1c0 None
0x42c1c4 None
RPCRT4.dll
0x42c17c NdrServerContextNewMarshall
0x42c180 NDRSContextUnmarshall2
0x42c184 NdrByteCountPointerUnmarshall
0x42c188 NdrEncapsulatedUnionMemorySize
RESUTILS.dll
0x42c16c ResUtilSetDwordValue
0x42c170 ResUtilGetAllProperties
0x42c174 ResUtilFreeParameterBlock
SETUPAPI.dll
0x42c190 SetupInstallFileExA
0x42c194 SetupDiCreateDeviceInfoA
USER32.dll
0x42c19c GrayStringA
0x42c1a0 GetDC
0x42c1a4 MessageBoxW
EAT(Export Address Table) is none
IMM32.dll
0x42c020 ImmDisableIME
0x42c024 ImmEscapeW
0x42c028 ImmGetRegisterWordStyleA
0x42c02c ImmNotifyIME
0x42c030 ImmSetCompositionFontW
KERNEL32.dll
0x42c038 VirtualProtect
0x42c03c CloseHandle
0x42c040 WriteConsoleW
0x42c044 SetFilePointerEx
0x42c048 SetStdHandle
0x42c04c GetConsoleMode
0x42c050 GetConsoleCP
0x42c054 FlushFileBuffers
0x42c058 EnumSystemLocalesW
0x42c05c GetUserDefaultLCID
0x42c060 IsValidLocale
0x42c064 GetLocaleInfoW
0x42c068 LCMapStringW
0x42c06c CompareStringW
0x42c070 GetTimeFormatW
0x42c074 GetDateFormatW
0x42c078 HeapSize
0x42c07c GetStringTypeW
0x42c080 HeapReAlloc
0x42c084 HeapAlloc
0x42c088 OutputDebugStringW
0x42c08c RtlUnwind
0x42c090 LoadLibraryExW
0x42c094 FreeLibrary
0x42c098 SetConsoleCtrlHandler
0x42c09c GetCommandLineA
0x42c0a0 GetLastError
0x42c0a4 SetLastError
0x42c0a8 GetCurrentThread
0x42c0ac GetCurrentThreadId
0x42c0b0 EncodePointer
0x42c0b4 DecodePointer
0x42c0b8 ExitProcess
0x42c0bc GetModuleHandleExW
0x42c0c0 GetProcAddress
0x42c0c4 AreFileApisANSI
0x42c0c8 MultiByteToWideChar
0x42c0cc WideCharToMultiByte
0x42c0d0 GetProcessHeap
0x42c0d4 GetStdHandle
0x42c0d8 GetFileType
0x42c0dc DeleteCriticalSection
0x42c0e0 GetStartupInfoW
0x42c0e4 GetModuleFileNameA
0x42c0e8 WriteFile
0x42c0ec GetModuleFileNameW
0x42c0f0 QueryPerformanceCounter
0x42c0f4 GetCurrentProcessId
0x42c0f8 GetSystemTimeAsFileTime
0x42c0fc GetEnvironmentStringsW
0x42c100 FreeEnvironmentStringsW
0x42c104 UnhandledExceptionFilter
0x42c108 SetUnhandledExceptionFilter
0x42c10c InitializeCriticalSectionAndSpinCount
0x42c110 CreateEventW
0x42c114 Sleep
0x42c118 GetCurrentProcess
0x42c11c TerminateProcess
0x42c120 TlsAlloc
0x42c124 TlsGetValue
0x42c128 TlsSetValue
0x42c12c TlsFree
0x42c130 GetTickCount
0x42c134 GetModuleHandleW
0x42c138 CreateSemaphoreW
0x42c13c EnterCriticalSection
0x42c140 LeaveCriticalSection
0x42c144 FatalAppExitA
0x42c148 HeapFree
0x42c14c IsValidCodePage
0x42c150 GetACP
0x42c154 GetOEMCP
0x42c158 GetCPInfo
0x42c15c IsDebuggerPresent
0x42c160 IsProcessorFeaturePresent
0x42c164 CreateFileW
GDI32.dll
0x42c000 GetLogColorSpaceW
0x42c004 SelectClipPath
0x42c008 GetLogColorSpaceA
0x42c00c Rectangle
0x42c010 SetTextCharacterExtra
0x42c014 GetViewportOrgEx
0x42c018 RemoveFontResourceExW
msi.dll
0x42c1ac None
0x42c1b0 None
0x42c1b4 None
0x42c1b8 None
0x42c1bc None
0x42c1c0 None
0x42c1c4 None
RPCRT4.dll
0x42c17c NdrServerContextNewMarshall
0x42c180 NDRSContextUnmarshall2
0x42c184 NdrByteCountPointerUnmarshall
0x42c188 NdrEncapsulatedUnionMemorySize
RESUTILS.dll
0x42c16c ResUtilSetDwordValue
0x42c170 ResUtilGetAllProperties
0x42c174 ResUtilFreeParameterBlock
SETUPAPI.dll
0x42c190 SetupInstallFileExA
0x42c194 SetupDiCreateDeviceInfoA
USER32.dll
0x42c19c GrayStringA
0x42c1a0 GetDC
0x42c1a4 MessageBoxW
EAT(Export Address Table) is none