Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85.dll
Resource
win7-20220414-en
General
-
Target
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85.dll
-
Size
2.0MB
-
MD5
b38e751e7101c3cc163c6fd77fda959f
-
SHA1
ef125f6a233f7036157d38a02ad09de8226adc13
-
SHA256
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85
-
SHA512
8c0d7434419e07d27d772239ae2c32bd95ad57979e10a8bd7808f1f21215b42ff9497c430127a8b3ec77f9544f9a11a078c1af45776fea1d69775625928c0819
Malware Config
Extracted
bumblebee
707a
172.240.175.194:183
171.85.135.192:358
223.7.203.157:407
45.153.242.183:443
211.68.220.197:102
174.119.130.65:369
202.41.22.30:314
58.10.113.168:308
12.33.69.160:285
205.185.123.137:443
112.188.178.13:332
168.205.228.104:480
83.218.135.147:151
228.175.209.140:269
240.114.36.128:411
8.109.227.172:304
142.11.245.185:443
214.233.117.120:167
198.135.200.7:254
73.74.56.146:272
14.42.55.81:416
15.237.42.8:408
159.192.221.167:410
197.26.182.136:279
41.140.44.116:454
161.144.98.94:427
46.208.205.43:235
37.231.14.207:370
183.236.246.8:410
41.232.231.227:382
47.225.45.93:285
162.191.88.20:114
114.170.141.82:227
90.86.27.214:238
117.176.252.35:344
247.184.192.227:394
95.26.242.141:126
75.146.161.164:331
15.14.147.134:401
50.69.254.239:246
69.181.36.251:119
53.34.28.231:447
44.245.217.17:369
237.57.151.39:372
103.175.16.105:443
67.35.182.6:434
146.19.173.31:443
20.189.66.15:257
105.221.27.232:344
88.82.146.11:254
204.63.253.164:476
191.159.75.135:494
214.207.26.205:301
16.182.11.140:166
45.135.162.238:267
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 760 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe 760 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:760