Analysis
-
max time kernel
101s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 09:59
Behavioral task
behavioral1
Sample
a1ec21eda64e0a6edc5f16978c6b752c66f4338a9d750fa246c7344a8c76ad90.xlsb
Resource
win7-20220812-en
General
-
Target
a1ec21eda64e0a6edc5f16978c6b752c66f4338a9d750fa246c7344a8c76ad90.xlsb
-
Size
208KB
-
MD5
b8c86fdc6fc2479498b92d474021d8c5
-
SHA1
8256aed96aa28b8d80956d5022bf5ada15218927
-
SHA256
a1ec21eda64e0a6edc5f16978c6b752c66f4338a9d750fa246c7344a8c76ad90
-
SHA512
2e4f21d5675bf7ee2b1edc3af51afff3d48ba2288f863e5c5ab3412494495eeafbb4c8e5fa53688c784fdd9ae110d445158b56dc831f9128012dd99f9b5e1f8f
-
SSDEEP
6144:CehHpGTRt0hgI/qm1Uz/SyQI9dTbmeo70uWoeJJggmA8:CehHYRt0Wax1ASrWfJaZA8
Malware Config
Extracted
Extracted
bumblebee
2010m
23.106.160.112:443
146.59.116.146:443
172.93.193.220:443
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3536 3132 regsvr32.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2716 3132 regsvr32.exe 82 -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Wine regsvr32.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2716 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3132 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe 2716 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE 3132 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3536 3132 EXCEL.EXE 89 PID 3132 wrote to memory of 3536 3132 EXCEL.EXE 89 PID 3132 wrote to memory of 2716 3132 EXCEL.EXE 90 PID 3132 wrote to memory of 2716 3132 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a1ec21eda64e0a6edc5f16978c6b752c66f4338a9d750fa246c7344a8c76ad90.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s calc2⤵
- Process spawned unexpected child process
PID:3536
-
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Kepofad\Jdvidasja\Fuelavrb.dll2⤵
- Process spawned unexpected child process
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51e97fac877fd16aa937bdc35714cc058
SHA1ef7687fd12df2a102e443a9cfa6c09a1f16b0035
SHA256ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6
SHA5123d62557bfa3903b59275a0d9ff910e4382a4d574d7d27d1c23d9755368b735ac3be2f49f7021816051cf85a92e913cb5b7d4b3cafe8aded0e602900875caba90
-
Filesize
3.6MB
MD51e97fac877fd16aa937bdc35714cc058
SHA1ef7687fd12df2a102e443a9cfa6c09a1f16b0035
SHA256ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6
SHA5123d62557bfa3903b59275a0d9ff910e4382a4d574d7d27d1c23d9755368b735ac3be2f49f7021816051cf85a92e913cb5b7d4b3cafe8aded0e602900875caba90