Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2022 07:35
Static task
static1
Behavioral task
behavioral1
Sample
bb.img
Resource
win7-20220901-en
General
-
Target
bb.img
-
Size
2.7MB
-
MD5
19b54d91705cce89218ece1e52bdb7ad
-
SHA1
905723cb555878c30990b4dde712279a9dd62f25
-
SHA256
fe2568cea3666dd24343675139ecc41ed6515bb7ef3a8c429d081d77ce4fecb4
-
SHA512
9c03491da4b2f2232e3a41532bc5dfca3c311c4661e4ad04a4f0af1cfe0c26f1f7b171190531e4b2362c280cfdd93bdc4ac9dcf290f157edb90be33a37f48adc
-
SSDEEP
49152:2ayur8YwnS01ZT37lLtdgnU46t5ABYUwdXgHJS0IHgGRtO2a8:2jQ8YwnS01pt5ABYUwdXgOA0
Malware Config
Extracted
bumblebee
0209
159.196.99.235:220
46.241.88.151:473
163.42.208.175:408
145.251.206.111:433
132.48.91.216:310
161.93.194.47:182
218.182.82.154:398
145.239.30.219:443
202.2.19.182:100
98.24.210.54:363
235.13.194.195:257
56.105.54.206:125
212.182.37.77:468
206.189.172.134:307
172.87.185.49:402
210.164.71.146:202
95.102.250.247:112
17.218.240.241:314
118.117.38.104:479
254.167.162.25:158
234.39.157.71:454
144.104.103.226:415
163.231.141.208:464
130.207.14.93:178
249.59.61.253:463
224.16.66.190:112
170.49.76.121:314
113.151.84.95:247
75.186.34.149:257
52.224.150.104:154
47.37.83.198:316
56.81.86.67:162
90.241.111.252:229
54.127.151.126:359
155.89.243.195:141
26.124.76.111:210
174.119.246.227:256
64.58.35.79:467
49.46.2.94:360
112.45.212.3:447
248.130.66.251:117
210.167.206.178:140
189.205.35.219:458
32.71.11.182:457
0.157.132.154:327
155.167.85.21:284
15.229.21.243:255
2.17.79.33:455
177.150.0.181:123
104.168.136.137:443
90.238.19.236:392
23.254.204.109:443
48.251.42.114:378
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Wine odbcconf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2108 odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe 2108 odbcconf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 1476 cmd.exe Token: SeManageVolumePrivilege 1476 cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bb.img1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3876
-
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" /a {REGSVR ZxGEglpFzQMQIL.dll}1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2108