Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15/06/2022, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
project.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
project.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
project.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
project.rsp
Resource
win10v2004-20220414-en
General
-
Target
project requirements.lnk
-
Size
1KB
-
MD5
db4e4a4e926e4dfe525929250afe7ae7
-
SHA1
4eb0bb7294c53f896527ce770e3c299c2fcbfdca
-
SHA256
7c38f9a113c85027806676885e027e4ed7de6b3c9bbd0861babfc2a8c911ec48
-
SHA512
f75a3e9b0bb22c9335bbd38bda8858ec6d7f11dd66c0bd26d45be4d9c0c4f49b9f559e5ed4be9da7a9f9e77f920c0aebb27ae60876a26635987ba504b997a538
Malware Config
Extracted
bumblebee
156a
83.47.40.251:306
251.143.69.150:395
64.250.120.4:406
115.16.153.155:459
233.82.38.10:391
60.27.170.3:463
221.218.33.190:154
218.199.149.25:415
0.134.23.62:116
241.41.90.117:181
78.244.227.62:462
146.70.125.122:443
224.49.28.61:214
2.97.24.126:148
112.81.173.199:399
170.107.238.10:276
45.84.0.13:443
210.163.58.211:385
146.19.173.186:443
154.56.0.102:443
168.20.103.16:132
51.210.158.156:443
193.43.251.231:312
135.142.208.39:298
9.240.112.25:411
155.113.182.180:324
174.58.225.25:420
208.151.241.134:362
228.127.34.30:316
178.255.155.53:108
30.65.48.152:239
135.36.13.40:427
117.50.181.41:373
213.26.162.157:477
78.174.92.106:151
114.9.152.233:402
1.32.39.22:459
224.255.62.16:414
45.3.236.177:312
185.62.56.202:443
251.210.76.59:335
120.237.172.163:343
32.181.245.23:191
79.198.114.179:442
242.30.221.68:198
95.29.177.99:462
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe 1764 odbcconf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1764 1504 cmd.exe 28 PID 1504 wrote to memory of 1764 1504 cmd.exe 28 PID 1504 wrote to memory of 1764 1504 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project requirements.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" -f project.rsp2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1764
-