Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 15:58
Static task
static1
Behavioral task
behavioral1
Sample
ZRoeaQxZZMZDVb.dll
Resource
win7-20220901-en
General
-
Target
ZRoeaQxZZMZDVb.dll
-
Size
2.0MB
-
MD5
29a405557da7bb24b2f278c5c46dfd3c
-
SHA1
a089591a65546d9f25e769c7f22b0c61e1836223
-
SHA256
0e3933b1489a91bfe99dd652d7e64c09380b210d2404f32b26251d34fa58ca8b
-
SHA512
b332d39986610cc8a1e816d567107778f5c9e45d6bf55c614e673f5853b990abb312a052773afba6eb8a0fb3f5d942d010f7188ccf36f79f3e8a86c7e65731ba
-
SSDEEP
49152:wivSCQ/OKrPtUJMo3OqiLd/+VeKUiGOxjYSguvSfc:wivSCQ/jzaT
Malware Config
Extracted
bumblebee
0709lg
253.99.168.157:367
114.13.1.160:226
34.113.116.119:165
204.227.208.101:422
90.128.124.215:224
95.45.92.109:292
211.135.230.28:111
199.40.74.224:435
85.230.106.25:390
189.255.181.14:334
213.227.154.169:443
232.196.162.145:304
214.20.238.201:145
87.216.172.198:397
171.201.228.43:398
87.63.40.34:125
120.83.66.17:278
34.65.29.63:243
45.153.240.94:443
232.179.211.66:291
233.228.105.224:221
193.11.177.213:238
186.218.162.100:196
95.54.17.61:431
215.155.35.33:309
205.5.165.193:253
191.215.252.12:299
190.104.233.232:454
30.4.135.103:343
24.64.244.156:187
3.17.97.51:305
3.110.118.231:273
194.140.110.231:247
228.57.16.249:115
226.124.246.118:179
253.102.241.231:316
186.40.222.142:173
146.132.130.18:100
16.28.192.164:130
219.150.99.178:460
204.235.52.15:241
104.121.55.132:124
172.238.228.106:169
46.189.108.213:259
5.149.200.203:181
7.41.78.160:194
24.84.58.88:201
217.244.142.77:452
75.25.196.244:194
213.233.43.49:438
163.104.136.59:134
118.189.229.22:297
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4140 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe 4140 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ZRoeaQxZZMZDVb.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4140