Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 19:01
Static task
static1
Behavioral task
behavioral1
Sample
YBnruijYBbnbMK.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
YBnruijYBbnbMK.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
required documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
required documents.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
vEzFDEkEeKmEBW.dll
Resource
win7-20220812-en
General
-
Target
required documents.lnk
-
Size
995B
-
MD5
8c234f946e3b4f57904c9b9dc2361fa7
-
SHA1
8ab79dfa9fb1d8f9000ba070850187d88fe097dc
-
SHA256
43bd0f3809340f3b58d734690305c293e0805781798d0e56552642d96a31c780
-
SHA512
63d73a999011659642e54c4841c1a396a5357e1163bb259aed5c1cb10c0878374fd02edd3db6b14d934aa1041fccfd7216966fcf9e926a04624edcf3d7e3071d
Malware Config
Extracted
bumblebee
2710vm
23.106.160.141:443
198.98.56.242:443
104.244.77.61:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 564 rundll32.exe 3 564 rundll32.exe 4 564 rundll32.exe 5 564 rundll32.exe 6 564 rundll32.exe 7 564 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 564 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2008 wrote to memory of 692 2008 cmd.exe 28 PID 2008 wrote to memory of 692 2008 cmd.exe 28 PID 2008 wrote to memory of 692 2008 cmd.exe 28 PID 692 wrote to memory of 564 692 cmd.exe 29 PID 692 wrote to memory of 564 692 cmd.exe 29 PID 692 wrote to memory of 564 692 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required documents.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c YBnruijYBbnbMK.bat2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\rundll32.exerundll32 vEzFDEkEeKmEBW.dll,AppLoad3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:564
-
-