Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-11-2022 22:37
Static task
static1
Behavioral task
behavioral1
Sample
OyNrEOXqQnrBVp.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
OyNrEOXqQnrBVp.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
documents.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
swBdvsXKmEsXgd.bat
Resource
win7-20220812-en
General
-
Target
documents.lnk
-
Size
995B
-
MD5
d427e019e49028f4062aaabac1d861aa
-
SHA1
0eb483a71363383046df31ef34ad0adba2e2f92e
-
SHA256
82be83916929f212ea1c6b41fa731a767140cec9ba3e0becf652c9185092ded5
-
SHA512
68a0a7419d2fde01d4654c8703301385e0284c56303cde86234d7ba3d38a114b96c371924ee484c1b2e039042a1cecf4558e88bc8ac65662d66ecfc30fb4b75b
Malware Config
Extracted
bumblebee
0311
64.44.102.224:443
146.70.161.59:443
192.236.194.104:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1824 rundll32.exe 3 1824 rundll32.exe 4 1824 rundll32.exe 5 1824 rundll32.exe 8 1824 rundll32.exe 9 1824 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1824 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1764 1448 cmd.exe 28 PID 1448 wrote to memory of 1764 1448 cmd.exe 28 PID 1448 wrote to memory of 1764 1448 cmd.exe 28 PID 1764 wrote to memory of 1824 1764 cmd.exe 29 PID 1764 wrote to memory of 1824 1764 cmd.exe 29 PID 1764 wrote to memory of 1824 1764 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c swBdvsXKmEsXgd.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\rundll32.exerundll32 OyNrEOXqQnrBVp.dll,BasicLoad3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1824
-
-