Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2022 22:37
Static task
static1
Behavioral task
behavioral1
Sample
OyNrEOXqQnrBVp.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
OyNrEOXqQnrBVp.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
documents.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
swBdvsXKmEsXgd.bat
Resource
win7-20220812-en
General
-
Target
documents.lnk
-
Size
995B
-
MD5
d427e019e49028f4062aaabac1d861aa
-
SHA1
0eb483a71363383046df31ef34ad0adba2e2f92e
-
SHA256
82be83916929f212ea1c6b41fa731a767140cec9ba3e0becf652c9185092ded5
-
SHA512
68a0a7419d2fde01d4654c8703301385e0284c56303cde86234d7ba3d38a114b96c371924ee484c1b2e039042a1cecf4558e88bc8ac65662d66ecfc30fb4b75b
Malware Config
Extracted
bumblebee
0311
64.44.102.224:443
146.70.161.59:443
192.236.194.104:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 30 2548 rundll32.exe 50 2548 rundll32.exe 59 2548 rundll32.exe 63 2548 rundll32.exe 73 2548 rundll32.exe 104 2548 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2548 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4656 wrote to memory of 3080 4656 cmd.exe 82 PID 4656 wrote to memory of 3080 4656 cmd.exe 82 PID 3080 wrote to memory of 2548 3080 cmd.exe 83 PID 3080 wrote to memory of 2548 3080 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c swBdvsXKmEsXgd.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\rundll32.exerundll32 OyNrEOXqQnrBVp.dll,BasicLoad3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2548
-
-