Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
PDbfQsNCbKysMm.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PDbfQsNCbKysMm.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
mGntZOOiFtyWBy.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
mGntZOOiFtyWBy.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
General
-
Target
PDbfQsNCbKysMm.bat
-
Size
1KB
-
MD5
e41202ae491aedc10e4ee319a045be15
-
SHA1
2f719f9c05f92c31135b75da8e6e803b71843c05
-
SHA256
bad4aed36b4167a0f00a72f8598cc9dab2069e0f908be9b58b72d10690aea622
-
SHA512
82dff15c383a23592b3e3d00ccc85d4bebf61e4821ebe8b855ddfd0a3ae953a49b791d3e57537ae255990d9956a6284820b67c6da105e10be7e730078a28a1fc
Malware Config
Extracted
bumblebee
0711
85.239.52.15:443
85.239.54.192:443
85.239.52.113:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 16 2784 rundll32.exe 37 2784 rundll32.exe 42 2784 rundll32.exe 47 2784 rundll32.exe 53 2784 rundll32.exe 54 2784 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2784 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2784 1508 cmd.exe 82 PID 1508 wrote to memory of 2784 1508 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PDbfQsNCbKysMm.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\rundll32.exerundll32 mGntZOOiFtyWBy.dll,csvcrun2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2784
-