Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-05-2022 20:30

General

  • Target

    9339fe09ff7f8cc9c853d6d6a5171858.dll

  • Size

    2.6MB

  • MD5

    9339fe09ff7f8cc9c853d6d6a5171858

  • SHA1

    b5ddc9a0b1e7d639a0d71c6627337995b3a02ed6

  • SHA256

    48f664496412e4da22a0d539aca9fe98737a194103d55ff58ea15dae95935d90

  • SHA512

    b75c9d33b22403526e12642ecba9b9fa07afd4101865398e4956ff18e200c18528724a9d26c27182c829c62e87e513496fcbafa9a55b9dc1729ca74ba1f276f0

Malware Config

Extracted

Family

bumblebee

C2

23.83.134.136:443

138.201.190.52:443

Attributes
  • group_id

    25html

    AwIWMFX6fJ

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Enumerates VirtualBox registry keys 2 TTPs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9339fe09ff7f8cc9c853d6d6a5171858.dll,#1
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:3576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3576-130-0x00000243ECF10000-0x00000243ED15B000-memory.dmp

    Filesize

    2.3MB

  • memory/3576-131-0x00007FFC98F40000-0x00007FFC98F50000-memory.dmp

    Filesize

    64KB