Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22/06/2022, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
m4ros.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
m4ros.dll
Resource
win10v2004-20220414-en
General
-
Target
documents.lnk
-
Size
2KB
-
MD5
9df6df3b98d90c2a892c2120876b6339
-
SHA1
f1634315324fb3bb1384c4197be3bef0cf447a83
-
SHA256
c307536aa32637598b607bc03c11daaf50c7adffcae47b22c29c3deb5302d674
-
SHA512
1499b16b317e7020438cfbc0af7e7345687a2bffacbe6b354ee404ba5f79d659d798df8446569afc05e1c2f43d19d60a9a3423fa7fec4b120dfc989ad804c855
Malware Config
Extracted
bumblebee
226r
24.60.199.116:370
145.100.67.15:360
101.96.171.173:155
182.52.208.138:119
6.138.120.113:452
103.175.16.47:443
99.189.165.204:103
174.83.182.164:221
138.22.181.180:246
51.139.193.203:488
196.99.108.92:240
67.127.134.116:328
160.173.252.174:275
202.106.192.129:291
194.202.95.243:336
174.166.74.219:203
198.104.198.26:492
118.101.230.66:260
192.119.77.241:443
181.108.184.158:156
75.62.239.106:332
243.197.36.47:229
248.181.184.125:229
44.110.120.160:248
192.68.215.224:387
124.173.140.161:434
196.220.214.27:284
133.23.207.159:352
54.38.136.111:443
213.157.95.2:217
3.52.61.200:474
85.183.182.66:470
248.154.108.83:346
35.253.84.152:383
130.32.72.32:499
195.217.169.228:316
71.188.135.202:323
74.86.251.146:417
245.176.230.29:217
91.240.112.81:139
63.73.102.220:311
212.117.50.221:247
195.180.89.163:434
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Wine rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1912 1964 cmd.exe 29 PID 1964 wrote to memory of 1912 1964 cmd.exe 29 PID 1964 wrote to memory of 1912 1964 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" m4ros.dll,NyGlisDIKN2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1912
-