Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17/06/2022, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
54bed834c04ae9d6971b63eab0342bf39cf0c4454c7519cfc6861638ca6090bd.dll
Resource
win7-20220414-en
General
-
Target
54bed834c04ae9d6971b63eab0342bf39cf0c4454c7519cfc6861638ca6090bd.dll
-
Size
1.8MB
-
MD5
0c96812e195ff482bf9679fe348b3428
-
SHA1
7c39f792665a5b0619c97415f1080a10b89d9f80
-
SHA256
54bed834c04ae9d6971b63eab0342bf39cf0c4454c7519cfc6861638ca6090bd
-
SHA512
ac0b32d21d3c2fde8f16ba5080a6992bbd264a62fb31535f971502276114f18d41f2c668cc7f6de00946c1720fd4ea0aa268cb4cf221ba2e22c049f319f8bc39
Malware Config
Extracted
bumblebee
166a
85.239.33.172:443
25.5.198.104:440
223.31.110.102:393
213.226.100.95:443
25.181.64.39:236
199.193.159.46:283
45.138.172.246:443
84.250.88.57:386
145.244.80.29:230
133.17.128.73:319
14.102.170.127:377
1.39.166.217:166
14.40.68.19:391
146.19.173.186:443
199.201.12.90:201
212.110.132.77:289
69.38.43.160:207
131.169.248.28:201
141.178.39.245:323
28.148.236.16:485
183.91.36.206:369
7.233.9.154:168
206.131.11.214:414
98.196.25.145:368
126.6.22.125:214
23.254.217.222:443
45.84.0.13:443
90.21.237.13:395
246.154.29.229:449
113.66.39.194:420
14.163.179.250:420
188.231.189.21:153
118.169.209.254:101
233.145.248.254:488
211.17.15.55:327
12.153.80.238:153
125.48.108.197:171
45.142.214.120:443
103.0.111.142:267
163.193.25.54:420
155.50.196.216:294
83.34.167.175:116
178.137.191.220:411
78.94.31.59:119
182.76.20.26:437
145.239.28.110:443
82.21.111.25:490
106.194.193.254:359
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe 1972 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\54bed834c04ae9d6971b63eab0342bf39cf0c4454c7519cfc6861638ca6090bd.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1972