Analysis
-
max time kernel
29s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-09-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
af2ee66b2d500592d403d7e9d2fefca6bb4dfda332517a9d29d510d6cb43fe2c.dll
Resource
win7-20220812-en
General
-
Target
af2ee66b2d500592d403d7e9d2fefca6bb4dfda332517a9d29d510d6cb43fe2c.dll
-
Size
1.8MB
-
MD5
8e5b5977740c91b2c6c2c7a1526ce773
-
SHA1
e09187f29416d8e8b5176cb4cf22cdfdf743313d
-
SHA256
af2ee66b2d500592d403d7e9d2fefca6bb4dfda332517a9d29d510d6cb43fe2c
-
SHA512
a006467db7f5457d91a82190c5ecad87d722ba2f82123a8c113279764b3341384d8487709213ec82e26b02a7c750b28576196127fefbbe8876f0716044f06901
-
SSDEEP
49152:+c3D/V8zHZRDr0VzoLMahBrfWvmn2H6C0n:+g/V8zHZRDWzoLRhBrfWvm2H6C0n
Malware Config
Extracted
bumblebee
3108
247.123.99.147:290
163.159.161.98:338
84.88.36.128:126
213.3.241.78:174
82.124.63.119:343
134.3.181.250:300
165.197.104.159:211
104.168.162.242:443
100.141.139.132:293
228.12.17.45:122
9.12.182.210:246
21.197.211.56:328
128.14.205.155:194
218.163.29.18:219
21.141.107.203:196
214.151.80.130:288
49.167.40.130:467
155.217.214.178:149
197.216.31.35:336
90.184.109.195:201
163.202.14.226:470
194.104.33.14:373
185.252.117.62:467
246.54.136.174:494
60.214.201.115:224
28.191.212.111:388
7.63.122.18:133
98.103.75.72:218
166.143.190.171:307
107.179.120.201:319
6.0.96.24:172
223.249.117.69:387
178.181.65.192:367
196.245.52.178:313
152.97.157.224:376
190.217.83.42:443
93.193.161.61:461
5.205.124.48:194
223.51.13.87:233
227.236.138.20:126
103.175.16.60:443
67.198.151.141:153
121.148.10.10:118
185.83.152.95:427
148.123.229.77:468
171.190.4.45:441
103.175.16.10:443
59.193.21.28:126
237.121.218.180:209
207.132.122.170:195
118.240.56.78:377
201.98.114.67:497
39.70.25.83:341
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1020 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe 1020 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\af2ee66b2d500592d403d7e9d2fefca6bb4dfda332517a9d29d510d6cb43fe2c.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1020