Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 19:53
Static task
static1
Behavioral task
behavioral1
Sample
HKpiLfqChJKPLc.dll
Resource
win7-20220812-en
General
-
Target
HKpiLfqChJKPLc.dll
-
Size
1.2MB
-
MD5
a2a55bdae16915aea3bc1933b04eb5e1
-
SHA1
83e2082f4b30e6475fdf0eeb435f7ef8500363a4
-
SHA256
6b3a8f1b3ee2f33912815aa18ed89184ffcc0ddf8619b7551aba216e20e1fe88
-
SHA512
46269e04b69f1e8fa6346905becfc3e3cfd08a4ec781b11ef4d16b7c4d70fba5186245986b31f68f57866f755c133c248d057e9ea5ccbbb83175e6905401a9f8
-
SSDEEP
24576:v2g6iSk124v3QMwo04WbKpHd/bq2Nf6lRcN5AWwem6EU0MmJO85:ug6iH13l04yK7/bERcLwBLKU
Malware Config
Extracted
bumblebee
0109
238.135.187.178:122
139.250.85.120:389
48.125.193.25:152
114.213.187.231:380
111.253.120.98:250
226.62.116.55:344
167.157.111.216:424
172.237.68.92:206
16.58.16.45:200
250.119.214.35:204
3.103.169.104:449
241.138.197.72:484
217.78.123.134:168
111.153.255.170:258
44.157.167.56:261
88.38.249.218:141
124.110.55.236:298
248.92.195.241:424
244.202.83.43:409
106.233.170.108:279
96.188.217.60:173
84.221.218.120:100
159.104.75.166:346
213.231.246.58:435
51.83.249.204:443
120.87.37.168:153
110.167.91.68:459
178.191.59.83:434
40.30.44.164:172
136.79.37.133:189
120.80.124.185:480
2.166.110.196:427
231.97.171.162:497
25.78.72.70:139
35.177.159.176:486
146.70.106.163:443
77.107.57.122:103
89.1.246.38:325
96.36.139.9:434
25.65.103.99:483
152.209.117.91:451
166.219.247.189:324
63.230.197.221:147
145.104.166.182:111
15.187.236.25:452
64.44.102.36:443
254.198.4.244:141
229.79.74.203:286
64.242.165.29:184
21.191.58.147:232
58.58.251.238:386
65.48.107.106:127
146.12.117.63:181
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 532 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe 532 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\HKpiLfqChJKPLc.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:532