Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
PDbfQsNCbKysMm.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PDbfQsNCbKysMm.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
mGntZOOiFtyWBy.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
mGntZOOiFtyWBy.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
General
-
Target
PDbfQsNCbKysMm.bat
-
Size
1KB
-
MD5
e41202ae491aedc10e4ee319a045be15
-
SHA1
2f719f9c05f92c31135b75da8e6e803b71843c05
-
SHA256
bad4aed36b4167a0f00a72f8598cc9dab2069e0f908be9b58b72d10690aea622
-
SHA512
82dff15c383a23592b3e3d00ccc85d4bebf61e4821ebe8b855ddfd0a3ae953a49b791d3e57537ae255990d9956a6284820b67c6da105e10be7e730078a28a1fc
Malware Config
Extracted
bumblebee
0711
85.239.52.15:443
85.239.54.192:443
85.239.52.113:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1284 rundll32.exe 3 1284 rundll32.exe 4 1284 rundll32.exe 5 1284 rundll32.exe 6 1284 rundll32.exe 7 1284 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1284 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1284 2016 cmd.exe 28 PID 2016 wrote to memory of 1284 2016 cmd.exe 28 PID 2016 wrote to memory of 1284 2016 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\PDbfQsNCbKysMm.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\rundll32.exerundll32 mGntZOOiFtyWBy.dll,csvcrun2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1284
-