Whenever Symantec Endpoint Protection quarantines a file, a .vbn file is created on the local machine under the path “C:\ProgramData\Symantec\Symantec Endpoint Protecton\[VERSION_NUMBER]\Data\Quarantine”.
Thanks to the tool "vbntool.py", a python script that can parse the information of the .vbn file and help us recover the quarantine file or get more information about the quarantine file.
Here's the link of the project : https://github.com/SkallZou/vbntool
The content above represents mimikatz.exe and will probably be flagged as malicious by Symantec Endpoint Protection.
Download this content as download.dat.
SEP detected it and quarantined it. In the same tme I've made another test with mimikatz.exe, SEP detected it as well and quarantined it likewise.
Two qurantine files mean two .vbn files under the path C:\ProgramData\Symantec\Symantec Endpoint Protecton\[VERSION_NUMBER]\Data\Quarantine right ?
We've got the 2 .vbn file under the folder, the run vbntool to see what kind of information does it provide.
The time stamp is matching perfectly the quarantine time of both files.
Let's extract the both quarantine file. Pass -o/--output to extract the quarantine file
A new test has been done with a malicious .pdf
The .pdf file has been detected and cleaned (deleted) by Symantec Endpoint Protection.
As usual we have the .vbn file and a folder that has the same name. From the previous experience, we know if the .vbn has a folder with a similar name, we will not take that .vbn file into account but get the .vbn file inside of that folder.
The option "-l" of "vbntool" gives more details and more information about the file that has been deleted or put in quarantine.
Many .vbn files can be found under the path “C:\ProgramData\Symantec\Symantec Endpoint Protection\[VERSIONNUMBER]\Data\Quarantine\”. Make sure that the .vbn file that you pick does not have a folder with the same name, otherwise the hexdump will show you some incorrect hex.
Before extracting the file, make sure to check the information of the quarantine file to know what kind of file is.
.exe, .pdf, .xlsx have different signatures, it will be useful to know those signature when editing the hexdump.
List of file signatures - Wikipedia