Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30/06/2022, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
d04578d91b1921355bfa4ba691a6f91b6e896a84efd33b389451488c56be63b7.dll
Resource
win7-20220414-en
General
-
Target
d04578d91b1921355bfa4ba691a6f91b6e896a84efd33b389451488c56be63b7.dll
-
Size
1.5MB
-
MD5
2edde858ea2eefa639ea23a7d63e5fa9
-
SHA1
448d8434c7b7265aa4fe2004d9a83add9583ee6b
-
SHA256
d04578d91b1921355bfa4ba691a6f91b6e896a84efd33b389451488c56be63b7
-
SHA512
ace5e65085ac71e7b06a5065d8f5df881f69ee7bdcc62b9c829487dbd76c951e831bccbc93fbb4e7559b7b62f52d7a01ded4ee13327012b2006215ac1ddb9213
Malware Config
Extracted
bumblebee
296a
218.17.34.195:107
108.62.118.145:443
195.193.46.112:234
224.8.125.117:383
174.230.203.32:222
159.248.111.91:306
195.86.112.33:266
140.112.120.134:115
222.137.120.137:146
56.248.40.53:437
83.249.212.150:127
2.100.7.120:332
134.76.108.38:304
61.213.140.44:487
174.58.214.252:228
229.192.93.82:321
40.47.149.113:157
95.46.196.232:438
77.180.42.62:122
42.104.196.184:489
132.192.131.17:234
82.243.107.181:424
231.156.18.117:120
28.183.174.200:264
22.252.18.49:278
97.85.69.250:304
200.96.205.64:403
227.92.242.49:366
200.36.197.174:163
172.93.193.187:443
168.178.117.244:213
247.123.209.17:459
62.6.55.230:462
98.208.7.42:112
47.195.111.117:460
132.180.181.255:320
146.70.125.120:443
238.15.66.119:273
112.127.218.232:490
14.63.191.213:386
23.82.140.155:443
196.169.119.250:193
93.125.80.119:163
135.39.208.107:247
92.52.249.52:179
193.152.23.40:465
37.189.74.5:272
184.35.181.167:135
155.77.18.55:121
47.199.12.234:457
4.13.210.199:227
216.237.236.193:288
79.39.146.80:156
54.38.136.209:443
167.62.45.128:142
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1336 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe 1336 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d04578d91b1921355bfa4ba691a6f91b6e896a84efd33b389451488c56be63b7.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1336