Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22/06/2022, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
be2092d9df8d3dbd6e1f0ca9a9abaf89bd8b8427dd94d7856ae5097679febcf6.dll
Resource
win7-20220414-en
General
-
Target
be2092d9df8d3dbd6e1f0ca9a9abaf89bd8b8427dd94d7856ae5097679febcf6.dll
-
Size
1.7MB
-
MD5
fdc7aae738ee93bfbcc3aabebe393084
-
SHA1
16c3bb5c965f806d2d913e09a5ddc137746c9f3a
-
SHA256
be2092d9df8d3dbd6e1f0ca9a9abaf89bd8b8427dd94d7856ae5097679febcf6
-
SHA512
7ceeac8fe9841397ec7dc6a6550fb9688a547fcd568299dac9807fb64c4b73bedeebad2acf35acf9a98db025f309e5b3dfe85703712642a035f22d16e15a4bfe
Malware Config
Extracted
bumblebee
226a
168.70.217.241:205
3.61.192.86:251
185.62.56.129:443
55.206.169.156:176
197.117.149.198:168
198.66.48.194:244
5.148.218.160:315
6.47.235.79:269
69.236.32.92:449
24.116.129.240:349
236.131.245.48:208
73.170.3.133:207
95.65.102.90:160
23.29.115.172:443
194.34.252.46:467
165.101.56.239:119
14.95.135.133:198
64.52.62.212:312
24.54.105.24:184
162.1.40.227:113
192.183.138.254:290
234.76.33.254:428
154.56.0.111:443
39.58.177.100:327
79.37.132.125:385
229.65.129.62:150
152.89.247.79:443
64.199.135.91:135
216.75.54.150:340
132.114.26.102:337
108.62.118.221:443
251.152.199.145:447
96.214.154.144:408
54.19.111.221:322
23.82.141.11:443
187.53.224.191:267
120.49.68.251:152
244.142.152.117:177
4.50.238.17:245
49.203.189.110:172
220.83.78.151:289
56.229.23.210:483
243.90.219.204:277
146.19.173.191:443
97.190.132.99:474
189.156.29.213:411
60.237.15.58:340
180.37.255.47:278
66.60.149.163:312
172.93.181.233:443
193.118.214.108:367
103.21.48.15:229
41.10.157.107:442
146.203.140.236:337
228.140.32.113:201
73.18.162.239:278
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe 1380 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\be2092d9df8d3dbd6e1f0ca9a9abaf89bd8b8427dd94d7856ae5097679febcf6.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1380