Resubmissions
28-09-2022 17:46
220928-wcfezahghq 128-09-2022 17:45
220928-wbw2bsgga4 128-09-2022 17:41
220928-v9h2pagfh3 328-09-2022 17:38
220928-v7n5xshggr 128-09-2022 17:33
220928-v4vtasgfg2 128-09-2022 17:30
220928-v3f9hshggk 128-09-2022 17:23
220928-vyaaeahgfk 1028-09-2022 17:13
220928-vrh9qshgdq 128-09-2022 17:10
220928-vpztpshgdn 128-09-2022 17:08
220928-vnl68ahgdk 3Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 17:23
Static task
static1
General
-
Target
Invoice_09-12-22_order_157.iso
-
Size
4.2MB
-
MD5
b1938ffbd6dcc69183382302604e84e5
-
SHA1
6d9984400b133cf92289d8ccd129f5d7133ce268
-
SHA256
b47bad8968dbe798ac7dc1a5648206c1819160ecd68449d9dd82ba19a0296288
-
SHA512
736e695281ed259e616d0862c64ebff16cd845767e5998162f0e7e0fe0161a0be037d17be5beb8ccade317008004880b834dab851cff04897bfa434995d33a3c
-
SSDEEP
49152:PA4O7LDVaMxLT7IHXcnfwYcoAVGnUmEd70dl4ievKgTN:PAZD3SYUmE2dl4jK
Malware Config
Extracted
bumblebee
1209
142.11.211.32:443
146.59.116.49:443
192.236.155.219:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Wine rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 212 rundll32.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 212 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe 212 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 464 cmd.exe Token: SeManageVolumePrivilege 464 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3944 wrote to memory of 2404 3944 cmd.exe 110 PID 3944 wrote to memory of 2404 3944 cmd.exe 110 PID 3944 wrote to memory of 212 3944 cmd.exe 111 PID 3944 wrote to memory of 212 3944 cmd.exe 111 PID 4452 wrote to memory of 2316 4452 cmd.exe 114 PID 4452 wrote to memory of 2316 4452 cmd.exe 114 PID 1296 wrote to memory of 4164 1296 cmd.exe 118 PID 1296 wrote to memory of 4164 1296 cmd.exe 118 PID 2088 wrote to memory of 1880 2088 cmd.exe 121 PID 2088 wrote to memory of 1880 2088 cmd.exe 121 PID 4652 wrote to memory of 2664 4652 cmd.exe 124 PID 4652 wrote to memory of 2664 4652 cmd.exe 124 PID 4332 wrote to memory of 2128 4332 cmd.exe 127 PID 4332 wrote to memory of 2128 4332 cmd.exe 127
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Invoice_09-12-22_order_157.iso1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:2404
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\countermanding.dat,vcsfile2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:4164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:1880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:2664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\mag\estuary.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h mag\countermanding.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:2128
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD51c33ff54542ea652f6d4eba0ec1f3ac3
SHA10f7b0dacdfc9cb37ab1aa84474673dd186e0739a
SHA256b717633aca32bf358c9a4c7c82b4e54a1d78898a9c158ac4fb56f8327c0495a2
SHA51257826879dbaa47fa592e74699b7f561e9a688af3e1db312fb33e61ac7a8c041b931834bc52fb8eb2d354de9fa3470a56850ef6dbd294b87fb63afcb8cf6d3303
-
Filesize
2.8MB
MD51c33ff54542ea652f6d4eba0ec1f3ac3
SHA10f7b0dacdfc9cb37ab1aa84474673dd186e0739a
SHA256b717633aca32bf358c9a4c7c82b4e54a1d78898a9c158ac4fb56f8327c0495a2
SHA51257826879dbaa47fa592e74699b7f561e9a688af3e1db312fb33e61ac7a8c041b931834bc52fb8eb2d354de9fa3470a56850ef6dbd294b87fb63afcb8cf6d3303