Resubmissions
11-11-2022 08:08
221111-j1y6rscebm 1012-05-2022 21:09
220512-zzj88aabg5 1011-05-2022 17:34
220511-v5d7yahaan 10Analysis
-
max time kernel
147s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 21:09
Static task
static1
Behavioral task
behavioral1
Sample
New Folder.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New Folder.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
desk.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
desk.dll
Resource
win10v2004-20220414-en
General
-
Target
New Folder.lnk
-
Size
1KB
-
MD5
f40f57579623acd5c105e59e23d25572
-
SHA1
84b7fd207f04b59a1bad3287db7c75415c53a60d
-
SHA256
83bbe84835486fc58812b378e3a149873c1d2404e8ba402dbbbefa48f6a18fd5
-
SHA512
8bcd116fc97dbdb8a143eff16bbfd2e4ee1f10645da694a5bad05c4f7c9ed7e5a70908e764ab09b2011cee545a0a1fc934403e44c44f50edfbf028b383618c1c
Malware Config
Extracted
bumblebee
1105a
142.11.222.79:443
23.254.224.200:443
103.175.16.52:443
199.195.252.30:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation cmd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Wine rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe 1412 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1412 5004 cmd.exe 83 PID 5004 wrote to memory of 1412 5004 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\New Folder.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" desk.dll,aCmHmjrptS2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1412
-