Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2022 01:51

General

  • Target

    wayworn.dll

  • Size

    883KB

  • MD5

    648d3be0c1ff4d28d224d6d104f0d4b9

  • SHA1

    0a37ec313167900169a63ade8a511c23dd0da31d

  • SHA256

    9cffe526ba68aefba5193fe1e691d947fffc55d1ab19b943d8bdd53c7ad7ac87

  • SHA512

    88b51cc55a0be6badf177ae381b7a09831bd8bac832009a4f0b01a53dad606d43bceba34ddbaf39ca1ae59443f25027795acde399a020524826d004ccc3ceedf

  • SSDEEP

    24576:0Q3nqD17TJdFDfdKTg6yatRrKGpafqhQNsLtQm7A/t:0QXq1zb92RrD3hQyJQoA/

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

0211r

C2

193.109.120.156:443

192.111.146.184:443

104.219.233.113:443

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Blocklisted process makes network request 6 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\wayworn.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of NtCreateThreadExHideFromDebugger
    PID:3208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3208-132-0x000002501F350000-0x000002501F499000-memory.dmp

    Filesize

    1.3MB

  • memory/3208-133-0x000002501F070000-0x000002501F0E6000-memory.dmp

    Filesize

    472KB