Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2022 20:59
Static task
static1
Behavioral task
behavioral1
Sample
AxRHrzxRUiEjUG.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AxRHrzxRUiEjUG.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
XzdVAVxwxRDMJS.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
XzdVAVxwxRDMJS.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
required info.lnk
Resource
win7-20220812-en
General
-
Target
required info.lnk
-
Size
995B
-
MD5
f0555c679b00d40934f69bbbd0f9ba38
-
SHA1
a746c1aa481e7cd9667b07755205e38a6b659308
-
SHA256
c60f4fe7007786b401e203a3429810666cc9685447bea269605dc97e082b5169
-
SHA512
bc3e47cc9f6bad9ced9c6f0890c2397db4df2010d64ff1a7d9214fff5bf99927959763854cc1d323a5c43a936b8c34b035a9f59daa6732fe87c1ceb5cd3bdb2f
Malware Config
Extracted
bumblebee
0111
102.151.221.33:443
104.244.77.61:443
212.114.52.124:443
23.106.160.141:443
198.98.56.242:443
23.108.57.5:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 29 4896 rundll32.exe 34 4896 rundll32.exe 36 4896 rundll32.exe 38 4896 rundll32.exe 39 4896 rundll32.exe 40 4896 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4896 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3108 wrote to memory of 4796 3108 cmd.exe 82 PID 3108 wrote to memory of 4796 3108 cmd.exe 82 PID 4796 wrote to memory of 4896 4796 cmd.exe 83 PID 4796 wrote to memory of 4896 4796 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\required info.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c AxRHrzxRUiEjUG.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\rundll32.exerundll32 XzdVAVxwxRDMJS.dll,RemoveSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4896
-
-