Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-11-2022 20:59
Static task
static1
Behavioral task
behavioral1
Sample
AxRHrzxRUiEjUG.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AxRHrzxRUiEjUG.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
XzdVAVxwxRDMJS.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
XzdVAVxwxRDMJS.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
required info.lnk
Resource
win7-20220812-en
General
-
Target
required info.lnk
-
Size
995B
-
MD5
f0555c679b00d40934f69bbbd0f9ba38
-
SHA1
a746c1aa481e7cd9667b07755205e38a6b659308
-
SHA256
c60f4fe7007786b401e203a3429810666cc9685447bea269605dc97e082b5169
-
SHA512
bc3e47cc9f6bad9ced9c6f0890c2397db4df2010d64ff1a7d9214fff5bf99927959763854cc1d323a5c43a936b8c34b035a9f59daa6732fe87c1ceb5cd3bdb2f
Malware Config
Extracted
bumblebee
0111
102.151.221.33:443
104.244.77.61:443
212.114.52.124:443
23.106.160.141:443
198.98.56.242:443
23.108.57.5:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1828 rundll32.exe 3 1828 rundll32.exe 4 1828 rundll32.exe 5 1828 rundll32.exe 6 1828 rundll32.exe 7 1828 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1828 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 864 wrote to memory of 868 864 cmd.exe 29 PID 864 wrote to memory of 868 864 cmd.exe 29 PID 864 wrote to memory of 868 864 cmd.exe 29 PID 868 wrote to memory of 1828 868 cmd.exe 30 PID 868 wrote to memory of 1828 868 cmd.exe 30 PID 868 wrote to memory of 1828 868 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required info.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c AxRHrzxRUiEjUG.bat2⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\system32\rundll32.exerundll32 XzdVAVxwxRDMJS.dll,RemoveSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1828
-
-