Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
Project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
upload.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
upload.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
upload.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
upload.rsp
Resource
win10v2004-20220414-en
General
-
Target
Project requirements.lnk
-
Size
1KB
-
MD5
0b97b19bd8dd2e986089e3453d4cbee4
-
SHA1
5a51fd8005b627172baf7fde880a80d2ec6384a0
-
SHA256
82d421e750608b1f2005400cdd0e00ef9e43347851495a21091da04f4d689188
-
SHA512
b87f532e712e3cc01f37ab7ca3a7e6411c5d24df4c8fc3a608c7c267de83d1f15373a8acd3381bc3d62d2cccb92c3ed982db3feb02837e5941fe117522476076
Malware Config
Extracted
bumblebee
707a
172.240.175.194:183
171.85.135.192:358
223.7.203.157:407
45.153.242.183:443
211.68.220.197:102
174.119.130.65:369
202.41.22.30:314
58.10.113.168:308
12.33.69.160:285
205.185.123.137:443
112.188.178.13:332
168.205.228.104:480
83.218.135.147:151
228.175.209.140:269
240.114.36.128:411
8.109.227.172:304
142.11.245.185:443
214.233.117.120:167
198.135.200.7:254
73.74.56.146:272
14.42.55.81:416
15.237.42.8:408
159.192.221.167:410
197.26.182.136:279
41.140.44.116:454
161.144.98.94:427
46.208.205.43:235
37.231.14.207:370
183.236.246.8:410
41.232.231.227:382
47.225.45.93:285
162.191.88.20:114
114.170.141.82:227
90.86.27.214:238
117.176.252.35:344
247.184.192.227:394
95.26.242.141:126
75.146.161.164:331
15.14.147.134:401
50.69.254.239:246
69.181.36.251:119
53.34.28.231:447
44.245.217.17:369
237.57.151.39:372
103.175.16.105:443
67.35.182.6:434
146.19.173.31:443
20.189.66.15:257
105.221.27.232:344
88.82.146.11:254
204.63.253.164:476
191.159.75.135:494
214.207.26.205:301
16.182.11.140:166
45.135.162.238:267
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Wine odbcconf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1768 odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe 1768 odbcconf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 548 wrote to memory of 1768 548 cmd.exe 28 PID 548 wrote to memory of 1768 548 cmd.exe 28 PID 548 wrote to memory of 1768 548 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Project requirements.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" -f upload.rsp2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1768
-