Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2022 20:52

General

  • Target

    NOwPpfBRiTFTYD.dll

  • Size

    1.8MB

  • MD5

    b3ab9b4d0f69155cc7df3f72b647afc1

  • SHA1

    4698056d14689edbf8d7ef1d6b0b327644eecee5

  • SHA256

    8bf1c0d4bf445006046e26fce66e8c45d034c23ec3f73a14d5230b090bf3662d

  • SHA512

    8de0d2cf3be709740e5205bfcb3dbff9077cbaa1ec6cd3c52f7b36d7c6e23940c4230e8c378d0f575952f9120c46e9f44008a4a9f2b52032d9671692bdd8e3d5

  • SSDEEP

    24576:T3HZCk3SJpRELLhZZ63PdojKS9S5Kz+qKyTENoQk9jYfcoucV:T3HZCKLJKVoj/YtOFYfcIV

Malware Config

Extracted

Family

bumblebee

Botnet

0609

C2

84.167.88.233:345

215.145.61.202:308

137.40.97.52:338

246.203.125.82:132

70.248.138.150:450

246.254.85.162:227

101.50.12.208:402

14.62.107.26:472

205.185.121.173:443

177.8.108.125:102

187.128.248.53:325

107.189.1.156:443

85.76.146.210:369

41.1.133.165:470

249.69.10.40:322

155.198.230.103:351

33.11.192.227:449

28.229.156.200:263

159.128.17.14:415

46.67.127.195:493

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\NOwPpfBRiTFTYD.dll
    1⤵
    • Enumerates VirtualBox registry keys
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Looks for VirtualBox Guest Additions in registry
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtCreateThreadExHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-54-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x0000000001EE0000-0x0000000001FF6000-memory.dmp

    Filesize

    1.1MB

  • memory/1672-57-0x0000000001EE0000-0x0000000001FF6000-memory.dmp

    Filesize

    1.1MB