Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2022 17:42
Static task
static1
General
-
Target
Invoice_10-05_order_243_PDF.iso
-
Size
5.1MB
-
MD5
7ac101af437a95d3c807b700cea04b5c
-
SHA1
fd13343f8385faf32457f68759f53d64933e08f3
-
SHA256
a035499bec49b0cc817c1b28c54c3e54bf32da37ead102ddcecc774b78f787cc
-
SHA512
c4ccfb59ce8e7e4ddc7e220e54775ea6132f1f471c7caefecae58bac4113ca77918aa4a65d782503c7f1c76a619a9bec5394a999f0bb6fd69b3feb6a36c12c01
-
SSDEEP
49152:2i85Zvppa5zh0ldtkedFfzgoOxP0Jh44m:Fao9h6diYhaxP0Jh44m
Malware Config
Extracted
bumblebee
0510
51.83.250.102:443
150.125.181.52:443
208.115.216.246:443
192.119.77.44:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Wine rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1340 rundll32.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: NOTEPAD.EXE -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1340 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe 1340 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2028 cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 5076 2364 cmd.exe 99 PID 2364 wrote to memory of 5076 2364 cmd.exe 99 PID 2364 wrote to memory of 1340 2364 cmd.exe 100 PID 2364 wrote to memory of 1340 2364 cmd.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Invoice_10-05_order_243_PDF.iso1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""E:\cobshyrawroe\readingbowling.bat" "1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h cobshyrawroe\sidesplitting.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:5076
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\sidesplitting.dat,ctrlrun2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" E:\cobshyrawroe\readingbowling.bat1⤵
- Enumerates connected drives
PID:3300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD55f2108e9d4e01aa602780f444e288d4c
SHA1dc2fcc2539c7b624469996c174ec3361d4f5434c
SHA256f3035775e9bed079ad27360e3cb6efbc4877b9a1bf72ad6d42e63cff10650541
SHA512e3aaaf69f5ce2b810a94369bd129e5c09485fbbdc98d4f3dbb85437f0cb042c03ce02f87ed7684e4188d8dc704f52b569fc7a2abcbeb38b3191a83d104c13f97
-
Filesize
3.7MB
MD55f2108e9d4e01aa602780f444e288d4c
SHA1dc2fcc2539c7b624469996c174ec3361d4f5434c
SHA256f3035775e9bed079ad27360e3cb6efbc4877b9a1bf72ad6d42e63cff10650541
SHA512e3aaaf69f5ce2b810a94369bd129e5c09485fbbdc98d4f3dbb85437f0cb042c03ce02f87ed7684e4188d8dc704f52b569fc7a2abcbeb38b3191a83d104c13f97