Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11/06/2022, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
appbuild.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
appbuild.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220414-en
General
-
Target
documents.lnk
-
Size
1KB
-
MD5
63249b1d5afdb63750f55dad00e211d0
-
SHA1
116046209898e4d4004dfa7517d56416cc360190
-
SHA256
467d6e92d3a3c27b2e6c0c75ce20a031c3408f1a58ff09dd5f2c60d6996ad4a0
-
SHA512
697ebc4a06f65c0409be386b8655024ee59d99ed588eb0c59ec00daec64e2623c74279f411719f152bfd5fb0eb21f07790755d7ba6373891e8eca89985166e51
Malware Config
Extracted
bumblebee
LEG1
45.147.229.177:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF appbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo appbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest appbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse appbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService appbuild.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ appbuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ appbuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ appbuild.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions appbuild.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools appbuild.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion appbuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion appbuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate appbuild.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine appbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe 1144 appbuild.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1504 wrote to memory of 588 1504 cmd.exe 28 PID 1504 wrote to memory of 588 1504 cmd.exe 28 PID 1504 wrote to memory of 588 1504 cmd.exe 28 PID 588 wrote to memory of 1144 588 rundll32.exe 29 PID 588 wrote to memory of 1144 588 rundll32.exe 29 PID 588 wrote to memory of 1144 588 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX appbuild.exe2⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\appbuild.exeappbuild.exe /RegServer3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-