Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14/06/2022, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
ccde5e528a8da994b3cd96a988023acd16a78a9cea4fe5dc1b41d9a72890a995.dll
Resource
win7-20220414-en
General
-
Target
ccde5e528a8da994b3cd96a988023acd16a78a9cea4fe5dc1b41d9a72890a995.dll
-
Size
1.4MB
-
MD5
ccd45fd7136d6c54e31d1703164fa855
-
SHA1
e71645b6a0d82b0c3a1c7326e07140a8333229b3
-
SHA256
ccde5e528a8da994b3cd96a988023acd16a78a9cea4fe5dc1b41d9a72890a995
-
SHA512
f254c19b8c6cab02b277833d8b4b96ae7182d22e3a4d580780fd3e3f1d1c8392430f0431cf8d0f27504e3b8faf88b0372947279fabce921f09191624dabff104
Malware Config
Extracted
bumblebee
a10
45.153.240.155:443
142.11.196.174:443
54.37.130.166:443
146.70.95.244:443
185.62.57.19:443
45.153.240.139:443
103.144.139.18:443
51.68.147.233:443
185.62.56.128:443
51.83.251.245:443
185.62.56.21:443
154.56.0.236:443
104.168.164.153:443
193.27.14.242:443
146.70.53.183:443
146.19.253.15:443
160.20.147.191:443
79.110.52.236:443
37.72.174.23:443
64.44.135.230:443
103.175.16.108:443
146.70.106.83:443
185.62.56.224:443
103.175.16.106:443
154.56.0.223:443
103.175.16.38:443
104.168.204.123:443
198.98.62.156:443
146.19.173.195:443
154.56.0.219:443
154.56.0.214:443
45.153.240.56:443
45.150.67.154:443
154.56.0.215:443
185.62.57.20:443
146.70.104.229:443
45.142.214.167:443
45.147.231.202:443
193.233.203.243:443
51.68.145.54:443
185.62.57.27:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Wine rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe 1468 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ccde5e528a8da994b3cd96a988023acd16a78a9cea4fe5dc1b41d9a72890a995.dll,#11⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1468