Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
DKyVKmgVSvviRl.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DKyVKmgVSvviRl.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
aMLjTIhBvevLGx.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
aMLjTIhBvevLGx.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
details.lnk
Resource
win7-20220901-en
General
-
Target
details.lnk
-
Size
995B
-
MD5
318e9e89ec41466076292116a0e97880
-
SHA1
74a79d98c63ecb86c69bcd0346a346f1e4f85626
-
SHA256
ea1d322b8acea3e0d92846895391f96123f54fa1eb641b42a29ddd4b856b3065
-
SHA512
45151567ff4a7b810ebb6995c09038c06cc1dad08dc197a02ae2a705e46bcafeb3a080a706a39f5b272d3b88332c3524ebbc7c4bc7f1bb4e32a09c859e4aee18
Malware Config
Extracted
bumblebee
0411
192.119.120.146:443
54.37.131.10:443
146.70.139.252:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 62 4248 rundll32.exe 71 4248 rundll32.exe 78 4248 rundll32.exe 82 4248 rundll32.exe 84 4248 rundll32.exe 89 4248 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4248 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4332 4364 cmd.exe 78 PID 4364 wrote to memory of 4332 4364 cmd.exe 78 PID 4332 wrote to memory of 4248 4332 cmd.exe 79 PID 4332 wrote to memory of 4248 4332 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\details.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DKyVKmgVSvviRl.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\rundll32.exerundll32 aMLjTIhBvevLGx.dll,SendData3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4248
-
-