Overview
overview
10Static
static
Invoice_51...DF.iso
windows7-x64
10Invoice_51...DF.iso
windows10-2004-x64
3documents.lnk
windows7-x64
3documents.lnk
windows10-2004-x64
3refreshene...al.dll
windows7-x64
1refreshene...al.dll
windows10-2004-x64
3refreshene...le.vbs
windows7-x64
3refreshene...le.vbs
windows10-2004-x64
1refreshene...us.cmd
windows7-x64
1refreshene...us.cmd
windows10-2004-x64
1Analysis
-
max time kernel
386s -
max time network
412s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_5192_october_PDF.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice_5192_october_PDF.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
documents.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
refresheners/autobiographical.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
refresheners/autobiographical.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
refresheners/dispiritedlyComprehensible.vbs
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
refresheners/dispiritedlyComprehensible.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
refresheners/unthinkableIsthmus.cmd
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
refresheners/unthinkableIsthmus.cmd
Resource
win10v2004-20220812-en
General
-
Target
Invoice_5192_october_PDF.iso
-
Size
3.1MB
-
MD5
be78cdcec94c8840177f6ff4aee34308
-
SHA1
affe6055e02f6810b5824f1f310a2a4eb19db1e4
-
SHA256
17da2f6eafb65540a89058b0b285a34c9dad8772eeecca92dde03f9560b3e76d
-
SHA512
71170b9638d4ef1a9294b071696c241691938e9e9b8c8be682eeb386cbbf96bcc91e910468e2c6a834e74a09c7f6eb20f15a0f3e1b7b5938ae3fd27c45ff7fdf
-
SSDEEP
49152:mHUV3vWVjM+Ajfsa7w7O66nh3+fKsWxN5lqyMR3yxyMy96Tc7TB1wcSIllyFzxk1:UVIcdi33LV
Malware Config
Extracted
bumblebee
0310
192.119.74.28:443
54.38.138.5:443
45.141.58.37:443
146.70.147.39:443
146.70.149.48:443
103.144.139.158:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 9 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Wine rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Wine rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Wine rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
pid Process 1644 rundll32.exe 1976 rundll32.exe 944 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 1828 NOTEPAD.EXE 1972 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1644 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 1320 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1320 AUDIODG.EXE Token: 33 1320 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1320 AUDIODG.EXE Token: SeRestorePrivilege 1752 7zG.exe Token: 35 1752 7zG.exe Token: SeSecurityPrivilege 1752 7zG.exe Token: SeSecurityPrivilege 1752 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 7zG.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1988 1152 cmd.exe 28 PID 1152 wrote to memory of 1988 1152 cmd.exe 28 PID 1152 wrote to memory of 1988 1152 cmd.exe 28 PID 1056 wrote to memory of 1856 1056 WScript.exe 40 PID 1056 wrote to memory of 1856 1056 WScript.exe 40 PID 1056 wrote to memory of 1856 1056 WScript.exe 40 PID 1856 wrote to memory of 1644 1856 cmd.exe 42 PID 1856 wrote to memory of 1644 1856 cmd.exe 42 PID 1856 wrote to memory of 1644 1856 cmd.exe 42 PID 572 wrote to memory of 2024 572 WScript.exe 45 PID 572 wrote to memory of 2024 572 WScript.exe 45 PID 572 wrote to memory of 2024 572 WScript.exe 45 PID 2024 wrote to memory of 1976 2024 cmd.exe 47 PID 2024 wrote to memory of 1976 2024 cmd.exe 47 PID 2024 wrote to memory of 1976 2024 cmd.exe 47 PID 1972 wrote to memory of 1984 1972 WScript.exe 60 PID 1972 wrote to memory of 1984 1972 WScript.exe 60 PID 1972 wrote to memory of 1984 1972 WScript.exe 60 PID 1984 wrote to memory of 944 1984 cmd.exe 62 PID 1984 wrote to memory of 944 1984 cmd.exe 62 PID 1984 wrote to memory of 944 1984 cmd.exe 62
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Invoice_5192_october_PDF.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\Invoice_5192_october_PDF.iso"2⤵PID:1988
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1356
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5541⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:568
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Invoice_5192_october_PDF\" -ad -an -ai#7zMap4760:128:7zEvent277761⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1752
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\refresheners\dispiritedlyComprehensible.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\System32\cmd.execmd /c ""C:\refresheners\unthinkableIsthmus.cmd" rundl"2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\rundll32.exerundll32 refresheners\autobiographical.dat,runprog3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\refresheners\dispiritedlyComprehensible.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\System32\cmd.execmd /c ""C:\refresheners\unthinkableIsthmus.cmd" rundl"2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\rundll32.exerundll32 refresheners\autobiographical.dat,runprog3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\refresheners\dispiritedlyComprehensible.vbs"1⤵PID:1948
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\refresheners\unthinkableIsthmus.cmd1⤵
- Opens file in notepad (likely ransom note)
PID:1828
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\refresheners\dispiritedlyComprehensible.vbs1⤵
- Opens file in notepad (likely ransom note)
PID:1972
-
C:\Windows\system32\cmd.execmd /c ""C:\refresheners\unthinkableIsthmus.cmd" "1⤵PID:2032
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\refresheners\dispiritedlyComprehensible.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\cmd.execmd /c ""C:\refresheners\unthinkableIsthmus.cmd" rundl"2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\rundll32.exerundll32 c:\refresheners\autobiographical.dat,runprog3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD57d5e79ba518ebf8d2d75b2d1ce8be0a5
SHA123bfb82162dd8c5e9d4419ed7de24d99da3ed887
SHA2567e96320b387203fb394baf5a87c297ed6a879505634b4bfc47e7f502c07ca94e
SHA5128a1295fb75ed408cc4bd3dad9ecd0fbf9a643974d333f64eb65e96cb75c1813a95f5faf377d61eb60768efd078512de3163b9541ff46dd38f915b5c8fff84d78