Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17/06/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
start.dll
Resource
win7-20220414-en
General
-
Target
project requirements.lnk
-
Size
1KB
-
MD5
edda66bc860d630aaab6af733006a2c5
-
SHA1
900bf9e8428fac53bf932b2af2bd4a87c745c413
-
SHA256
d423bf5e25a80f24161fce6d9b9cc8698f5b63106c1470f0ebdfaae5882d50b0
-
SHA512
15b0556a1ef3c5d3aaddc8345b237423839a24acb4f8a260adb0b2b4d34f7e6e2d9e92b5f420e18dd04dfcf51b6b1c570073a1d27527a076a0289f86fc449400
Malware Config
Extracted
bumblebee
166a
85.239.33.172:443
25.5.198.104:440
223.31.110.102:393
213.226.100.95:443
25.181.64.39:236
199.193.159.46:283
45.138.172.246:443
84.250.88.57:386
145.244.80.29:230
133.17.128.73:319
14.102.170.127:377
1.39.166.217:166
14.40.68.19:391
146.19.173.186:443
199.201.12.90:201
212.110.132.77:289
69.38.43.160:207
131.169.248.28:201
141.178.39.245:323
28.148.236.16:485
183.91.36.206:369
7.233.9.154:168
206.131.11.214:414
98.196.25.145:368
126.6.22.125:214
23.254.217.222:443
45.84.0.13:443
90.21.237.13:395
246.154.29.229:449
113.66.39.194:420
14.163.179.250:420
188.231.189.21:153
118.169.209.254:101
233.145.248.254:488
211.17.15.55:327
12.153.80.238:153
125.48.108.197:171
45.142.214.120:443
103.0.111.142:267
163.193.25.54:420
155.50.196.216:294
83.34.167.175:116
178.137.191.220:411
78.94.31.59:119
182.76.20.26:437
145.239.28.110:443
82.21.111.25:490
106.194.193.254:359
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe 2024 odbcconf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2024 1836 cmd.exe 29 PID 1836 wrote to memory of 2024 1836 cmd.exe 29 PID 1836 wrote to memory of 2024 1836 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project requirements.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" -f project.rsp2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2024
-