Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
BOiQKiECaUzWqF.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BOiQKiECaUzWqF.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
eLWCBMEWwlzsBt.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
eLWCBMEWwlzsBt.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
required info.lnk
Resource
win7-20220812-en
General
-
Target
required info.lnk
-
Size
995B
-
MD5
08f421202c12f81c8fc56b4abd54f8c0
-
SHA1
00484c7d6fe78c4d6c85e2ee92d6edd8e01bca0a
-
SHA256
6dab064f55ba8832d0cb9afa1658da288e4c361f5c72df963c14b4321e9c3799
-
SHA512
aec8bb173cfc61fe0ac9cdd80c320555652d1b6aade4adcfac8f78f1d06d4bc0f59bf2df876a9a8d617ac27430615acc4661af90fa2812768cf450fa1dd9981f
Malware Config
Extracted
bumblebee
0111
102.151.221.33:443
104.244.77.61:443
212.114.52.124:443
23.106.160.141:443
198.98.56.242:443
23.108.57.5:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 19 220 rundll32.exe 29 220 rundll32.exe 34 220 rundll32.exe 36 220 rundll32.exe 37 220 rundll32.exe 39 220 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 220 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 796 wrote to memory of 4008 796 cmd.exe 82 PID 796 wrote to memory of 4008 796 cmd.exe 82 PID 4008 wrote to memory of 220 4008 cmd.exe 83 PID 4008 wrote to memory of 220 4008 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required info.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c eLWCBMEWwlzsBt.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\rundll32.exerundll32 BOiQKiECaUzWqF.dll,RemoveSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:220
-
-