Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2022 19:01
Static task
static1
Behavioral task
behavioral1
Sample
YBnruijYBbnbMK.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
YBnruijYBbnbMK.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
required documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
required documents.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
vEzFDEkEeKmEBW.dll
Resource
win7-20220812-en
General
-
Target
required documents.lnk
-
Size
995B
-
MD5
8c234f946e3b4f57904c9b9dc2361fa7
-
SHA1
8ab79dfa9fb1d8f9000ba070850187d88fe097dc
-
SHA256
43bd0f3809340f3b58d734690305c293e0805781798d0e56552642d96a31c780
-
SHA512
63d73a999011659642e54c4841c1a396a5357e1163bb259aed5c1cb10c0878374fd02edd3db6b14d934aa1041fccfd7216966fcf9e926a04624edcf3d7e3071d
Malware Config
Extracted
bumblebee
2710vm
23.106.160.141:443
198.98.56.242:443
104.244.77.61:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 28 4276 rundll32.exe 36 4276 rundll32.exe 41 4276 rundll32.exe 43 4276 rundll32.exe 44 4276 rundll32.exe 46 4276 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4276 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1636 2804 cmd.exe 82 PID 2804 wrote to memory of 1636 2804 cmd.exe 82 PID 1636 wrote to memory of 4276 1636 cmd.exe 83 PID 1636 wrote to memory of 4276 1636 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required documents.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c YBnruijYBbnbMK.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\rundll32.exerundll32 vEzFDEkEeKmEBW.dll,AppLoad3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4276
-
-