Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-11-2022 21:42
Static task
static1
Behavioral task
behavioral1
Sample
BOiQKiECaUzWqF.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BOiQKiECaUzWqF.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
eLWCBMEWwlzsBt.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
eLWCBMEWwlzsBt.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
required info.lnk
Resource
win7-20220812-en
General
-
Target
required info.lnk
-
Size
995B
-
MD5
08f421202c12f81c8fc56b4abd54f8c0
-
SHA1
00484c7d6fe78c4d6c85e2ee92d6edd8e01bca0a
-
SHA256
6dab064f55ba8832d0cb9afa1658da288e4c361f5c72df963c14b4321e9c3799
-
SHA512
aec8bb173cfc61fe0ac9cdd80c320555652d1b6aade4adcfac8f78f1d06d4bc0f59bf2df876a9a8d617ac27430615acc4661af90fa2812768cf450fa1dd9981f
Malware Config
Extracted
bumblebee
0111
102.151.221.33:443
104.244.77.61:443
212.114.52.124:443
23.106.160.141:443
198.98.56.242:443
23.108.57.5:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1036 rundll32.exe 3 1036 rundll32.exe 4 1036 rundll32.exe 5 1036 rundll32.exe 6 1036 rundll32.exe 7 1036 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1036 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 756 wrote to memory of 1712 756 cmd.exe 28 PID 756 wrote to memory of 1712 756 cmd.exe 28 PID 756 wrote to memory of 1712 756 cmd.exe 28 PID 1712 wrote to memory of 1036 1712 cmd.exe 29 PID 1712 wrote to memory of 1036 1712 cmd.exe 29 PID 1712 wrote to memory of 1036 1712 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required info.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c eLWCBMEWwlzsBt.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\rundll32.exerundll32 BOiQKiECaUzWqF.dll,RemoveSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1036
-
-