Report - vbc.exe

Malicious Library UPX Admin Tool (Sysinternals etc ...) PE32 PE File
ScreenShot
Created 2022.03.30 09:25 Machine s1_win7_x6403
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
6.6
ZERO API file : malware
VT API (file) 23 detected (Remcos, malicious, moderate confidence, Artemis, ZelphiCO, ZK0@aazuDGdi, Delf, Eldorado, MalPbs, gen1, InjectorX, Sabsik, score, CLOUD, susgen, EQPQ, confidence)
md5 efd638102b94041f24a6b614a46e0f70
sha256 204e96b879210c8e42455d3670b69e7c2408bb65324b8243346803ef24af6f9d
ssdeep 12288:k8XoVKkPa3yFwp0ShMnn0sAIpxxfBy2oYWVwyUcPdCL9/ZHi:zYIkCyFwXhM0jIpx+h7UcPdCLHH
imphash dbf1300428baed4574f07bfbbe98b092
impfuzzy 192:oV3MSbuuaDSUvK9Uso1XyYc0zz/Jg1OIPOQHN:43BaI9+BW1FPOQt
  Network IP location

Signature (15cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Creates a thread using CreateRemoteThread in a non-child process indicative of process injection
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Network activity contains more than one unique useragent
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://ars9095genesh.com/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv/Izqntwyxutbanbjksfuazfsxdqbthcr SG AMAZON-02 52.74.83.175 clean
ars9095genesh.com SG AMAZON-02 52.74.83.175 clean
52.74.83.175 SG AMAZON-02 52.74.83.175 clean

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x4837f8 SysFreeString
 0x4837fc SysReAllocStringLen
 0x483800 SysAllocStringLen
advapi32.dll
 0x483808 RegQueryValueExA
 0x48380c RegOpenKeyExA
 0x483810 RegCloseKey
user32.dll
 0x483818 GetKeyboardType
 0x48381c DestroyWindow
 0x483820 LoadStringA
 0x483824 MessageBoxA
 0x483828 CharNextA
kernel32.dll
 0x483830 GetACP
 0x483834 Sleep
 0x483838 VirtualFree
 0x48383c VirtualAlloc
 0x483840 GetTickCount
 0x483844 QueryPerformanceCounter
 0x483848 GetCurrentThreadId
 0x48384c InterlockedDecrement
 0x483850 InterlockedIncrement
 0x483854 VirtualQuery
 0x483858 WideCharToMultiByte
 0x48385c MultiByteToWideChar
 0x483860 lstrlenA
 0x483864 lstrcpynA
 0x483868 LoadLibraryExA
 0x48386c GetThreadLocale
 0x483870 GetStartupInfoA
 0x483874 GetProcAddress
 0x483878 GetModuleHandleA
 0x48387c GetModuleFileNameA
 0x483880 GetLocaleInfoA
 0x483884 GetLastError
 0x483888 GetCommandLineA
 0x48388c FreeLibrary
 0x483890 FindFirstFileA
 0x483894 FindClose
 0x483898 ExitProcess
 0x48389c CompareStringA
 0x4838a0 WriteFile
 0x4838a4 UnhandledExceptionFilter
 0x4838a8 SetFilePointer
 0x4838ac SetEndOfFile
 0x4838b0 RtlUnwind
 0x4838b4 ReadFile
 0x4838b8 RaiseException
 0x4838bc GetStdHandle
 0x4838c0 GetFileSize
 0x4838c4 GetFileType
 0x4838c8 CreateFileA
 0x4838cc CloseHandle
kernel32.dll
 0x4838d4 TlsSetValue
 0x4838d8 TlsGetValue
 0x4838dc LocalAlloc
 0x4838e0 GetModuleHandleA
user32.dll
 0x4838e8 CreateWindowExA
 0x4838ec WindowFromPoint
 0x4838f0 WaitMessage
 0x4838f4 UpdateWindow
 0x4838f8 UnregisterClassA
 0x4838fc UnhookWindowsHookEx
 0x483900 TranslateMessage
 0x483904 TranslateMDISysAccel
 0x483908 TrackPopupMenu
 0x48390c SystemParametersInfoA
 0x483910 ShowWindow
 0x483914 ShowScrollBar
 0x483918 ShowOwnedPopups
 0x48391c SetWindowsHookExA
 0x483920 SetWindowTextA
 0x483924 SetWindowPos
 0x483928 SetWindowPlacement
 0x48392c SetWindowLongW
 0x483930 SetWindowLongA
 0x483934 SetTimer
 0x483938 SetScrollRange
 0x48393c SetScrollPos
 0x483940 SetScrollInfo
 0x483944 SetRect
 0x483948 SetPropA
 0x48394c SetParent
 0x483950 SetMenuItemInfoA
 0x483954 SetMenu
 0x483958 SetForegroundWindow
 0x48395c SetFocus
 0x483960 SetCursor
 0x483964 SetClipboardData
 0x483968 SetClassLongA
 0x48396c SetCapture
 0x483970 SetActiveWindow
 0x483974 SendMessageW
 0x483978 SendMessageA
 0x48397c ScrollWindow
 0x483980 ScreenToClient
 0x483984 RemovePropA
 0x483988 RemoveMenu
 0x48398c ReleaseDC
 0x483990 ReleaseCapture
 0x483994 RegisterWindowMessageA
 0x483998 RegisterClipboardFormatA
 0x48399c RegisterClassA
 0x4839a0 RedrawWindow
 0x4839a4 PtInRect
 0x4839a8 PostQuitMessage
 0x4839ac PostMessageA
 0x4839b0 PeekMessageW
 0x4839b4 PeekMessageA
 0x4839b8 OpenClipboard
 0x4839bc OffsetRect
 0x4839c0 OemToCharA
 0x4839c4 MessageBoxA
 0x4839c8 MapWindowPoints
 0x4839cc MapVirtualKeyA
 0x4839d0 LoadStringA
 0x4839d4 LoadKeyboardLayoutA
 0x4839d8 LoadIconA
 0x4839dc LoadCursorA
 0x4839e0 LoadBitmapA
 0x4839e4 KillTimer
 0x4839e8 IsZoomed
 0x4839ec IsWindowVisible
 0x4839f0 IsWindowUnicode
 0x4839f4 IsWindowEnabled
 0x4839f8 IsWindow
 0x4839fc IsRectEmpty
 0x483a00 IsIconic
 0x483a04 IsDialogMessageW
 0x483a08 IsDialogMessageA
 0x483a0c IsChild
 0x483a10 InvalidateRect
 0x483a14 IntersectRect
 0x483a18 InsertMenuItemA
 0x483a1c InsertMenuA
 0x483a20 InflateRect
 0x483a24 GetWindowThreadProcessId
 0x483a28 GetWindowTextA
 0x483a2c GetWindowRect
 0x483a30 GetWindowPlacement
 0x483a34 GetWindowLongW
 0x483a38 GetWindowLongA
 0x483a3c GetWindowDC
 0x483a40 GetTopWindow
 0x483a44 GetSystemMetrics
 0x483a48 GetSystemMenu
 0x483a4c GetSysColorBrush
 0x483a50 GetSysColor
 0x483a54 GetSubMenu
 0x483a58 GetScrollRange
 0x483a5c GetScrollPos
 0x483a60 GetScrollInfo
 0x483a64 GetPropA
 0x483a68 GetParent
 0x483a6c GetWindow
 0x483a70 GetMessagePos
 0x483a74 GetMenuStringA
 0x483a78 GetMenuState
 0x483a7c GetMenuItemInfoA
 0x483a80 GetMenuItemID
 0x483a84 GetMenuItemCount
 0x483a88 GetMenu
 0x483a8c GetLastActivePopup
 0x483a90 GetKeyboardState
 0x483a94 GetKeyboardLayoutNameA
 0x483a98 GetKeyboardLayoutList
 0x483a9c GetKeyboardLayout
 0x483aa0 GetKeyState
 0x483aa4 GetKeyNameTextA
 0x483aa8 GetIconInfo
 0x483aac GetForegroundWindow
 0x483ab0 GetFocus
 0x483ab4 GetDlgItem
 0x483ab8 GetDesktopWindow
 0x483abc GetDCEx
 0x483ac0 GetDC
 0x483ac4 GetCursorPos
 0x483ac8 GetCursor
 0x483acc GetClipboardData
 0x483ad0 GetClientRect
 0x483ad4 GetClassNameA
 0x483ad8 GetClassLongA
 0x483adc GetClassInfoA
 0x483ae0 GetCapture
 0x483ae4 GetActiveWindow
 0x483ae8 FrameRect
 0x483aec FindWindowA
 0x483af0 FillRect
 0x483af4 EqualRect
 0x483af8 EnumWindows
 0x483afc EnumThreadWindows
 0x483b00 EnumClipboardFormats
 0x483b04 EnumChildWindows
 0x483b08 EndPaint
 0x483b0c EnableWindow
 0x483b10 EnableScrollBar
 0x483b14 EnableMenuItem
 0x483b18 EmptyClipboard
 0x483b1c DrawTextA
 0x483b20 DrawMenuBar
 0x483b24 DrawIconEx
 0x483b28 DrawIcon
 0x483b2c DrawFrameControl
 0x483b30 DrawEdge
 0x483b34 DispatchMessageW
 0x483b38 DispatchMessageA
 0x483b3c DestroyWindow
 0x483b40 DestroyMenu
 0x483b44 DestroyIcon
 0x483b48 DestroyCursor
 0x483b4c DeleteMenu
 0x483b50 DefWindowProcA
 0x483b54 DefMDIChildProcA
 0x483b58 DefFrameProcA
 0x483b5c CreatePopupMenu
 0x483b60 CreateMenu
 0x483b64 CreateIcon
 0x483b68 CloseClipboard
 0x483b6c ClientToScreen
 0x483b70 ChildWindowFromPoint
 0x483b74 CheckMenuItem
 0x483b78 CallWindowProcA
 0x483b7c CallNextHookEx
 0x483b80 BeginPaint
 0x483b84 CharNextA
 0x483b88 CharLowerBuffA
 0x483b8c CharLowerA
 0x483b90 CharToOemA
 0x483b94 AdjustWindowRectEx
 0x483b98 ActivateKeyboardLayout
gdi32.dll
 0x483ba0 UnrealizeObject
 0x483ba4 StretchBlt
 0x483ba8 SetWindowOrgEx
 0x483bac SetWinMetaFileBits
 0x483bb0 SetViewportOrgEx
 0x483bb4 SetTextColor
 0x483bb8 SetStretchBltMode
 0x483bbc SetROP2
 0x483bc0 SetPixel
 0x483bc4 SetEnhMetaFileBits
 0x483bc8 SetDIBColorTable
 0x483bcc SetBrushOrgEx
 0x483bd0 SetBkMode
 0x483bd4 SetBkColor
 0x483bd8 SelectPalette
 0x483bdc SelectObject
 0x483be0 SaveDC
 0x483be4 RoundRect
 0x483be8 RestoreDC
 0x483bec Rectangle
 0x483bf0 RectVisible
 0x483bf4 RealizePalette
 0x483bf8 Polyline
 0x483bfc PlayEnhMetaFile
 0x483c00 PatBlt
 0x483c04 MoveToEx
 0x483c08 MaskBlt
 0x483c0c LineTo
 0x483c10 IntersectClipRect
 0x483c14 GetWindowOrgEx
 0x483c18 GetWinMetaFileBits
 0x483c1c GetTextMetricsA
 0x483c20 GetTextExtentPoint32A
 0x483c24 GetSystemPaletteEntries
 0x483c28 GetStockObject
 0x483c2c GetRgnBox
 0x483c30 GetPixel
 0x483c34 GetPaletteEntries
 0x483c38 GetObjectA
 0x483c3c GetMapMode
 0x483c40 GetEnhMetaFilePaletteEntries
 0x483c44 GetEnhMetaFileHeader
 0x483c48 GetEnhMetaFileBits
 0x483c4c GetDeviceCaps
 0x483c50 GetDIBits
 0x483c54 GetDIBColorTable
 0x483c58 GetDCOrgEx
 0x483c5c GetCurrentPositionEx
 0x483c60 GetClipBox
 0x483c64 GetBrushOrgEx
 0x483c68 GetBitmapBits
 0x483c6c ExtTextOutA
 0x483c70 ExcludeClipRect
 0x483c74 Ellipse
 0x483c78 DeleteObject
 0x483c7c DeleteEnhMetaFile
 0x483c80 DeleteDC
 0x483c84 CreateSolidBrush
 0x483c88 CreatePenIndirect
 0x483c8c CreatePalette
 0x483c90 CreateHalftonePalette
 0x483c94 CreateFontIndirectA
 0x483c98 CreateDIBitmap
 0x483c9c CreateDIBSection
 0x483ca0 CreateCompatibleDC
 0x483ca4 CreateCompatibleBitmap
 0x483ca8 CreateBrushIndirect
 0x483cac CreateBitmap
 0x483cb0 CopyEnhMetaFileA
 0x483cb4 BitBlt
version.dll
 0x483cbc VerQueryValueA
 0x483cc0 GetFileVersionInfoSizeA
 0x483cc4 GetFileVersionInfoA
kernel32.dll
 0x483ccc lstrcpyA
 0x483cd0 lstrcmpA
 0x483cd4 WriteFile
 0x483cd8 WideCharToMultiByte
 0x483cdc WaitForSingleObject
 0x483ce0 VirtualQuery
 0x483ce4 VirtualProtect
 0x483ce8 VirtualAlloc
 0x483cec TlsFree
 0x483cf0 SizeofResource
 0x483cf4 SetThreadLocale
 0x483cf8 SetFilePointer
 0x483cfc SetEvent
 0x483d00 SetErrorMode
 0x483d04 SetEndOfFile
 0x483d08 ResetEvent
 0x483d0c ReadFile
 0x483d10 MultiByteToWideChar
 0x483d14 MulDiv
 0x483d18 LockResource
 0x483d1c LoadResource
 0x483d20 LoadLibraryA
 0x483d24 LeaveCriticalSection
 0x483d28 InitializeCriticalSection
 0x483d2c GlobalUnlock
 0x483d30 GlobalLock
 0x483d34 GlobalFree
 0x483d38 GlobalFindAtomA
 0x483d3c GlobalDeleteAtom
 0x483d40 GlobalAlloc
 0x483d44 GlobalAddAtomA
 0x483d48 GetVersionExA
 0x483d4c GetVersion
 0x483d50 GetTickCount
 0x483d54 GetThreadLocale
 0x483d58 GetStdHandle
 0x483d5c GetProcAddress
 0x483d60 GetModuleHandleA
 0x483d64 GetModuleFileNameA
 0x483d68 GetLocaleInfoA
 0x483d6c GetLocalTime
 0x483d70 GetLastError
 0x483d74 GetFullPathNameA
 0x483d78 GetDiskFreeSpaceA
 0x483d7c GetDateFormatA
 0x483d80 GetCurrentThreadId
 0x483d84 GetCurrentProcessId
 0x483d88 GetCurrentProcess
 0x483d8c GetCPInfo
 0x483d90 FreeResource
 0x483d94 InterlockedExchange
 0x483d98 FreeLibrary
 0x483d9c FormatMessageA
 0x483da0 FlushInstructionCache
 0x483da4 FindResourceA
 0x483da8 EnumCalendarInfoA
 0x483dac EnterCriticalSection
 0x483db0 DeleteCriticalSection
 0x483db4 CreateThread
 0x483db8 CreateFileA
 0x483dbc CreateEventA
 0x483dc0 CompareStringA
 0x483dc4 CloseHandle
 0x483dc8 AddAtomW
advapi32.dll
 0x483dd0 RegQueryValueExA
 0x483dd4 RegOpenKeyExA
 0x483dd8 RegFlushKey
 0x483ddc RegCloseKey
 0x483de0 AddAce
oleaut32.dll
 0x483de8 GetErrorInfo
 0x483dec SysFreeString
ole32.dll
 0x483df4 CoTaskMemAlloc
 0x483df8 CoCreateInstance
 0x483dfc CoUninitialize
 0x483e00 CoInitialize
kernel32.dll
 0x483e08 Sleep
oleaut32.dll
 0x483e10 SafeArrayPtrOfIndex
 0x483e14 SafeArrayGetUBound
 0x483e18 SafeArrayGetLBound
 0x483e1c SafeArrayCreate
 0x483e20 VariantChangeType
 0x483e24 VariantCopy
 0x483e28 VariantClear
 0x483e2c VariantInit
comctl32.dll
 0x483e34 _TrackMouseEvent
 0x483e38 ImageList_SetIconSize
 0x483e3c ImageList_GetIconSize
 0x483e40 ImageList_Write
 0x483e44 ImageList_Read
 0x483e48 ImageList_GetDragImage
 0x483e4c ImageList_DragShowNolock
 0x483e50 ImageList_DragMove
 0x483e54 ImageList_DragLeave
 0x483e58 ImageList_DragEnter
 0x483e5c ImageList_EndDrag
 0x483e60 ImageList_BeginDrag
 0x483e64 ImageList_Remove
 0x483e68 ImageList_DrawEx
 0x483e6c ImageList_Draw
 0x483e70 ImageList_GetBkColor
 0x483e74 ImageList_SetBkColor
 0x483e78 ImageList_Add
 0x483e7c ImageList_GetImageCount
 0x483e80 ImageList_Destroy
 0x483e84 ImageList_Create
 0x483e88 InitCommonControls
comdlg32.dll
 0x483e90 GetSaveFileNameA
 0x483e94 GetOpenFileNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure