Analysis
-
max time kernel
35s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6.dll
Resource
win7-20220812-en
General
-
Target
ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6.dll
-
Size
3.6MB
-
MD5
1e97fac877fd16aa937bdc35714cc058
-
SHA1
ef7687fd12df2a102e443a9cfa6c09a1f16b0035
-
SHA256
ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6
-
SHA512
3d62557bfa3903b59275a0d9ff910e4382a4d574d7d27d1c23d9755368b735ac3be2f49f7021816051cf85a92e913cb5b7d4b3cafe8aded0e602900875caba90
-
SSDEEP
24576:E3RgLkXy4o8Bhf1d9I25Xroti/mb8RqrU9dveOgTRXfXAffHjonc64PZmwfzbpSc:EBgLOM8bfVI25lm6n9klBfGt6AZbZSq
Malware Config
Extracted
bumblebee
2010m
23.106.160.112:443
146.59.116.146:443
172.93.193.220:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 900 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe 900 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ddb9895f9e74d3e7db4e94aa77338fdc221ed29f29857a9752545cddcf8f45a6.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:900