Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27/06/2022, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
loader.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
loader.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
n3zarek.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
n3zarek.dll
Resource
win10v2004-20220414-en
General
-
Target
loader.bat
-
Size
55B
-
MD5
7570714d0f7f867da3c26839c45842fd
-
SHA1
4d72ffc8ad5aa71c100f732da6eebd5d6e237414
-
SHA256
b3cb8e9bd42228a54aebd27f2f1435cb2643f698ab805aac64b691f0c0cdf5a6
-
SHA512
24396fa0e43cd8d5efa1c555905aae9ef1d7041d5aaf00e255d71ebbfc7dcaa72172c455148a2cefecfc52c1978ef782ce011473f4d837ae7a30f2c95880a613
Malware Config
Extracted
bumblebee
276r
76.81.225.65:337
41.28.188.77:212
51.199.209.83:290
192.119.77.100:443
68.121.248.35:464
54.37.131.14:443
149.197.87.217:409
224.110.0.53:105
253.13.70.127:340
122.50.173.112:157
103.25.51.23:388
199.61.79.119:346
68.14.88.177:143
227.12.148.222:270
33.93.97.183:112
168.113.169.88:428
64.157.160.42:207
156.151.142.100:123
146.19.253.56:443
135.36.57.27:157
124.79.186.17:245
254.230.180.37:486
179.4.178.202:339
14.155.143.74:191
31.228.253.114:427
218.122.217.28:234
212.107.138.109:287
29.122.243.158:226
175.90.216.232:197
12.75.186.131:263
227.233.79.54:327
156.165.161.82:298
150.37.37.18:112
145.250.252.150:418
234.248.206.141:176
141.69.161.34:281
24.4.68.32:418
10.28.17.62:401
194.120.202.95:468
245.245.176.160:137
78.24.136.181:493
28.107.38.196:269
151.233.218.244:192
21.21.141.32:133
159.117.143.69:265
154.171.215.86:169
78.74.20.180:433
135.79.221.116:303
194.129.76.203:490
19.32.56.182:487
241.0.19.171:313
35.120.155.220:262
155.180.101.133:318
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 912 988 cmd.exe 28 PID 988 wrote to memory of 912 988 cmd.exe 28 PID 988 wrote to memory of 912 988 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\loader.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\n3zarek.dll,RoOEiztJvW2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:912
-