Analysis
-
max time kernel
28s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
Project requirements.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Project requirements.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
upload.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
upload.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
upload.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
upload.rsp
Resource
win10v2004-20220414-en
General
-
Target
upload.dll
-
Size
2.0MB
-
MD5
d7bb608a3b370fa7f457b4e89bbdb594
-
SHA1
0c82220151415e6cbce25d2615d29f4352e0ecd5
-
SHA256
f0fdc0b64b747f348a87a382ff5dfe016107f95ab5953318cc8d9548a983efd1
-
SHA512
10c16d38e7fc6b8ccf9e023f50ae3600790d225ad5b170f4f76eb0d3c47d0cd3e01047fe89f7788cd482277ad91477bc369ab7e2a93acc7005f7cc9e7a8f2dd0
Malware Config
Extracted
bumblebee
707a
172.240.175.194:183
171.85.135.192:358
223.7.203.157:407
45.153.242.183:443
211.68.220.197:102
174.119.130.65:369
202.41.22.30:314
58.10.113.168:308
12.33.69.160:285
205.185.123.137:443
112.188.178.13:332
168.205.228.104:480
83.218.135.147:151
228.175.209.140:269
240.114.36.128:411
8.109.227.172:304
142.11.245.185:443
214.233.117.120:167
198.135.200.7:254
73.74.56.146:272
14.42.55.81:416
15.237.42.8:408
159.192.221.167:410
197.26.182.136:279
41.140.44.116:454
161.144.98.94:427
46.208.205.43:235
37.231.14.207:370
183.236.246.8:410
41.232.231.227:382
47.225.45.93:285
162.191.88.20:114
114.170.141.82:227
90.86.27.214:238
117.176.252.35:344
247.184.192.227:394
95.26.242.141:126
75.146.161.164:331
15.14.147.134:401
50.69.254.239:246
69.181.36.251:119
53.34.28.231:447
44.245.217.17:369
237.57.151.39:372
103.175.16.105:443
67.35.182.6:434
146.19.173.31:443
20.189.66.15:257
105.221.27.232:344
88.82.146.11:254
204.63.253.164:476
191.159.75.135:494
214.207.26.205:301
16.182.11.140:166
45.135.162.238:267
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1640 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe 1640 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\upload.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1640