Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 21:40
Static task
static1
General
-
Target
Scan_Document9698-(Nov8).iso
-
Size
1.0MB
-
MD5
2c0525c54018babb42a4c123bb8a9944
-
SHA1
3ba334b1ddcbc1375477bf382db3b82e87b3a425
-
SHA256
4797a2010eb6788cf55cd1f8a70e732770e136cc34aafcd973d536c98f52f649
-
SHA512
a4409e154cf56691ec89ac92ab4f111f1c2aa0d1c209be72b7e27cf5570546012e66621c77884b5d0b712ab799846d26f6f8707e62321cec4020a655de0475a8
-
SSDEEP
24576:2L6kLUpp+h2wCb2T/C6gndKfFG7GcIvUXVETg:2LlLCKPbkn23
Malware Config
Extracted
Family
bumblebee
Botnet
0811r
C2
176.223.165.108:443
146.19.253.28:443
146.70.149.38:443
rc4.plain
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\E: cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4524 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3596 4496 cmd.exe 97 PID 4496 wrote to memory of 3596 4496 cmd.exe 97 PID 3596 wrote to memory of 5112 3596 cmd.exe 99 PID 3596 wrote to memory of 5112 3596 cmd.exe 99 PID 3596 wrote to memory of 4524 3596 cmd.exe 100 PID 3596 wrote to memory of 4524 3596 cmd.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Scan_Document9698-(Nov8).iso1⤵PID:4104
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2428
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "E:\oxen\fixture.cmd"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K oxen\ufo.cmd system rundl2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\replace.exereplace C:\Windows\\system32\\rundll32.exe C:\Users\Admin\AppData\Local\Temp /A3⤵PID:5112
-
-
C:\Windows\system32\rundll32.exerundll32.exe oxen\dusty.jpg,PUpdate3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4524
-
-