Resubmissions
06-10-2022 12:56
221006-p6exzahfem 1006-10-2022 12:52
221006-p4h7lshde3 319-09-2022 16:57
220919-vggcdshdf9 3Analysis
-
max time kernel
82s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 12:56
Static task
static1
Behavioral task
behavioral1
Sample
54dee3dd5f14aba8b0d62ceaa419a777a3f1f070b49767f6545a2729ab65d3b1.dll
Resource
win7-20220812-en
General
-
Target
54dee3dd5f14aba8b0d62ceaa419a777a3f1f070b49767f6545a2729ab65d3b1.dll
-
Size
3.6MB
-
MD5
77e5ff1e4eff690fdcc6e0ba9877e1e6
-
SHA1
721b9448b4e54046e156b8ad3b35a8833ecd5daf
-
SHA256
54dee3dd5f14aba8b0d62ceaa419a777a3f1f070b49767f6545a2729ab65d3b1
-
SHA512
dd853f675de53ae50ea1618c097a2acf2c332c9eb35efefbe6e2dc56eaf16b7ef4bde5f496fe3c16ec1a877cbd0865600ce78ee378a30f37bb9df010511cb686
-
SSDEEP
24576:6uMZRLX8+gpL/+2thqiWjJa9cRXtdN86CHXuPVvDVHBXVWcs+lwWTAYq3/ny1Ow+:6jZJ8+gpL/hWjoe
Malware Config
Extracted
bumblebee
1909
108.177.235.29:443
23.106.160.117:443
23.106.215.133:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Wine rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3788 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1684 2144 WerFault.exe 17 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe 3788 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4728 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3768 osk.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3768 osk.exe 3768 osk.exe 3768 osk.exe 3768 osk.exe 3768 osk.exe 3768 osk.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3788 4280 cmd.exe 108 PID 4280 wrote to memory of 3788 4280 cmd.exe 108
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54dee3dd5f14aba8b0d62ceaa419a777a3f1f070b49767f6545a2729ab65d3b1.dll,#11⤵PID:2144
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2144 -s 3282⤵
- Program crash
PID:1684
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 2144 -ip 21441⤵PID:4244
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3484
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\rundll32.exerundll32.exe 54dee3dd5f14aba8b0d62ceaa419a777a3f1f070b49767f6545a2729ab65d3b1.dll,CreateTask2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3768
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728