Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-09-2022 19:45
Static task
static1
Behavioral task
behavioral1
Sample
applications.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
applications.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
hWnSpOvpRhOazT.dll
Resource
win7-20220901-en
General
-
Target
applications.lnk
-
Size
1KB
-
MD5
8e6a8c26d28b532737bee33c678ce4c1
-
SHA1
58b2afed5538ff1c65552dfb2ea5059edacf00f4
-
SHA256
777a7dbf91be6ae40c3ae08bdf42fcdabfbddb7f62c8d39fa604c9de5f6a17eb
-
SHA512
dad7132bf6483ec651a57c3a5a543e62a4a30e2eebf115ec37f35d295a8b7b0bec7294c0fc376a4b3d93663cc76715baa6cbc88f042826c417e72b69fe88d6d1
Malware Config
Extracted
bumblebee
0109
238.135.187.178:122
139.250.85.120:389
48.125.193.25:152
114.213.187.231:380
111.253.120.98:250
226.62.116.55:344
167.157.111.216:424
172.237.68.92:206
16.58.16.45:200
250.119.214.35:204
3.103.169.104:449
241.138.197.72:484
217.78.123.134:168
111.153.255.170:258
44.157.167.56:261
88.38.249.218:141
124.110.55.236:298
248.92.195.241:424
244.202.83.43:409
106.233.170.108:279
96.188.217.60:173
84.221.218.120:100
159.104.75.166:346
213.231.246.58:435
51.83.249.204:443
120.87.37.168:153
110.167.91.68:459
178.191.59.83:434
40.30.44.164:172
136.79.37.133:189
120.80.124.185:480
2.166.110.196:427
231.97.171.162:497
25.78.72.70:139
35.177.159.176:486
146.70.106.163:443
77.107.57.122:103
89.1.246.38:325
96.36.139.9:434
25.65.103.99:483
152.209.117.91:451
166.219.247.189:324
63.230.197.221:147
145.104.166.182:111
15.187.236.25:452
64.44.102.36:443
254.198.4.244:141
229.79.74.203:286
64.242.165.29:184
21.191.58.147:232
58.58.251.238:386
65.48.107.106:127
146.12.117.63:181
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Wine odbcconf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1044 odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe 1044 odbcconf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 544 wrote to memory of 1044 544 cmd.exe 27 PID 544 wrote to memory of 1044 544 cmd.exe 27 PID 544 wrote to memory of 1044 544 cmd.exe 27
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\applications.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" /a {REGSVR hWnSpOvpRhOazT.dll}2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1044
-