Resubmissions
04-10-2022 21:13
221004-z2w1sschal 10Analysis
-
max time kernel
303s -
max time network
318s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 21:13
Static task
static1
General
-
Target
Invoice_6177_october_PDF.iso
-
Size
3.1MB
-
MD5
8d74533876dfa9dba4dd9a5c49fe1c97
-
SHA1
a644ed59f66b3b3af47497a47fe9ab26831b2a99
-
SHA256
0c2ba8cd204753743de636ed9714b1ff24a7cc090b117b02388cb79210085edb
-
SHA512
41fd93881dd93527b5d9e87c67db701a44f8d5c61e1b3b46f29e6b845a6709621c1d592d61b42aa3528274bc3ec34c8ac8a4b07db67c4d9861995e0a6fdb659f
-
SSDEEP
49152:xxkyekKLHC3cjPUV3vkFwJkDZ8nf/yAcJ0beJRMr1TXUhCstOtCp2FmUZr45kq69:KtFQkDAf/rcJ0be3s
Malware Config
Extracted
bumblebee
0310
192.119.74.28:443
54.38.138.5:443
45.141.58.37:443
146.70.147.39:443
146.70.149.48:443
103.144.139.158:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation WScript.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Wine rundll32.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: Notepad.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3336 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe 3336 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4108 wrote to memory of 2572 4108 WScript.exe 91 PID 4108 wrote to memory of 2572 4108 WScript.exe 91 PID 2572 wrote to memory of 3336 2572 cmd.exe 95 PID 2572 wrote to memory of 3336 2572 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Invoice_6177_october_PDF.iso1⤵
- Modifies registry class
PID:4936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3332
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "E:\refresheners\prattleSafaris.vbs"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\refresheners\galvanicLiable.cmd" rundl"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\rundll32.exerundll32 refresheners\smote.dat,runprog3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" E:\refresheners\prattleSafaris.vbs1⤵
- Enumerates connected drives
PID:4224