Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27/06/2022, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
73a31d3ce275e2ac8acfe570a47710ed119e92e6b1860647030d65863145138a.dll
Resource
win7-20220414-en
General
-
Target
73a31d3ce275e2ac8acfe570a47710ed119e92e6b1860647030d65863145138a.dll
-
Size
1.4MB
-
MD5
5815bcacea7fda37e5e36a2b7c14be34
-
SHA1
b85a94538708a3cd2e3cd04d5b7c3ba1b18e1f71
-
SHA256
73a31d3ce275e2ac8acfe570a47710ed119e92e6b1860647030d65863145138a
-
SHA512
06b89d7673e39e2f7f63dd3b3706a9093227da581ce6db4a4da0d53650656952e0ff2387917c83f51df1f4921d5c53193fc4f0ae8d411de95893917cf9f0dab6
Malware Config
Extracted
bumblebee
276a
100.65.168.129:171
207.177.53.164:325
32.87.78.10:384
117.162.18.77:404
116.176.236.58:151
123.2.128.107:267
169.146.162.63:373
55.115.177.92:239
224.248.147.154:499
88.7.179.62:135
187.218.226.58:319
146.70.106.52:443
8.34.35.232:389
98.116.138.87:321
255.161.114.204:370
159.90.121.44:362
150.226.60.234:160
161.254.115.117:308
211.66.121.128:361
43.10.228.15:400
65.72.191.77:443
240.231.155.179:469
195.188.79.179:491
103.175.16.116:443
139.254.84.36:448
145.26.115.13:273
42.236.214.200:298
255.6.134.255:311
185.62.58.175:443
212.98.147.157:358
142.43.113.52:233
177.45.176.89:237
37.136.25.80:456
209.141.58.141:443
232.203.110.15:341
80.254.25.125:403
162.146.19.224:287
153.209.231.13:111
35.108.126.106:170
82.222.248.115:112
78.133.71.245:318
60.130.26.137:469
123.216.79.174:409
54.33.221.169:455
156.193.106.39:354
40.132.129.175:263
66.249.174.8:315
159.206.127.220:455
154.56.0.112:443
136.157.113.157:180
169.205.55.100:494
237.44.22.28:248
132.15.144.165:289
136.40.82.206:247
98.206.188.128:175
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe 4552 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\73a31d3ce275e2ac8acfe570a47710ed119e92e6b1860647030d65863145138a.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:4552