Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27/06/2022, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
Project Requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Project Requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
req.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
req.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
req.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
req.rsp
Resource
win10v2004-20220414-en
General
-
Target
req.dll
-
Size
1.4MB
-
MD5
de26dc1fee02ba446cad6c2f4c21fc31
-
SHA1
3ec4e5303d938f49db3393cb86364f144e18d514
-
SHA256
9e697d49727101d423116274df53a15676ad447e086df0972f91ae78064c9bc1
-
SHA512
800302fdbb4cb33528647f785b951a9f2d8f9d37bfe76d1db951e63a04a4272fd2eae727912cf5533783d4ee73fe6621b3b6dbd50e387b6a242addb40e17400a
Malware Config
Extracted
bumblebee
276a
100.65.168.129:171
207.177.53.164:325
32.87.78.10:384
117.162.18.77:404
116.176.236.58:151
123.2.128.107:267
169.146.162.63:373
55.115.177.92:239
224.248.147.154:499
88.7.179.62:135
187.218.226.58:319
146.70.106.52:443
8.34.35.232:389
98.116.138.87:321
255.161.114.204:370
159.90.121.44:362
150.226.60.234:160
161.254.115.117:308
211.66.121.128:361
43.10.228.15:400
65.72.191.77:443
240.231.155.179:469
195.188.79.179:491
103.175.16.116:443
139.254.84.36:448
145.26.115.13:273
42.236.214.200:298
255.6.134.255:311
185.62.58.175:443
212.98.147.157:358
142.43.113.52:233
177.45.176.89:237
37.136.25.80:456
209.141.58.141:443
232.203.110.15:341
80.254.25.125:403
162.146.19.224:287
153.209.231.13:111
35.108.126.106:170
82.222.248.115:112
78.133.71.245:318
60.130.26.137:469
123.216.79.174:409
54.33.221.169:455
156.193.106.39:354
40.132.129.175:263
66.249.174.8:315
159.206.127.220:455
154.56.0.112:443
136.157.113.157:180
169.205.55.100:494
237.44.22.28:248
132.15.144.165:289
136.40.82.206:247
98.206.188.128:175
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe 748 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\req.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:748