Analysis
-
max time kernel
90s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2022 20:52
Static task
static1
Behavioral task
behavioral1
Sample
NOwPpfBRiTFTYD.dll
Resource
win7-20220901-en
General
-
Target
NOwPpfBRiTFTYD.dll
-
Size
1.8MB
-
MD5
b3ab9b4d0f69155cc7df3f72b647afc1
-
SHA1
4698056d14689edbf8d7ef1d6b0b327644eecee5
-
SHA256
8bf1c0d4bf445006046e26fce66e8c45d034c23ec3f73a14d5230b090bf3662d
-
SHA512
8de0d2cf3be709740e5205bfcb3dbff9077cbaa1ec6cd3c52f7b36d7c6e23940c4230e8c378d0f575952f9120c46e9f44008a4a9f2b52032d9671692bdd8e3d5
-
SSDEEP
24576:T3HZCk3SJpRELLhZZ63PdojKS9S5Kz+qKyTENoQk9jYfcoucV:T3HZCKLJKVoj/YtOFYfcIV
Malware Config
Extracted
bumblebee
0609
84.167.88.233:345
215.145.61.202:308
137.40.97.52:338
246.203.125.82:132
70.248.138.150:450
246.254.85.162:227
101.50.12.208:402
14.62.107.26:472
205.185.121.173:443
177.8.108.125:102
187.128.248.53:325
107.189.1.156:443
85.76.146.210:369
41.1.133.165:470
249.69.10.40:322
155.198.230.103:351
33.11.192.227:449
28.229.156.200:263
159.128.17.14:415
46.67.127.195:493
208.216.25.193:250
220.13.251.119:331
108.90.104.11:287
123.239.27.225:337
50.159.69.41:237
24.198.233.171:341
125.239.243.198:469
69.103.210.138:419
158.173.253.217:225
168.133.238.36:190
86.195.214.92:250
214.124.190.40:172
175.206.149.152:313
12.19.236.28:397
152.179.209.102:440
243.11.15.0:286
108.117.245.10:312
219.141.84.9:296
32.36.123.174:334
130.127.46.124:211
8.39.213.130:478
3.173.254.247:114
57.182.63.216:185
192.236.155.47:443
194.90.154.20:369
106.44.131.19:389
163.138.203.210:126
48.208.56.14:209
16.247.46.70:498
140.236.200.163:340
188.92.158.199:348
112.163.138.190:499
130.32.255.95:152
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1968 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe 1968 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\NOwPpfBRiTFTYD.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1968