Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-11-2022 19:06
Static task
static1
Behavioral task
behavioral1
Sample
XAnbADuUedJlBE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XAnbADuUedJlBE.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
project details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
project details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
uDzpJZuAIMIPqQ.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
uDzpJZuAIMIPqQ.dll
Resource
win10v2004-20220812-en
General
-
Target
XAnbADuUedJlBE.bat
-
Size
1KB
-
MD5
8ae47905093ff8acd0fc3f023a30bbdc
-
SHA1
184fc76e91488b8ad5b3041153ba8d9a98eafc07
-
SHA256
7dfb2ecf76c386504119056d20f3a65d83f7bb3f297e2f63aa63b2e205c72105
-
SHA512
24e7ad5726e69f160dee69d103f6674bf929813763d1d2ae46bdd6132b3e8851de67c8171a53223a05dd1fcc9823becaefd108b7db8ab185d2a8bc8a3b150346
Malware Config
Extracted
bumblebee
0811
104.219.233.127:443
192.236.194.101:443
146.70.161.82:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 2044 rundll32.exe 3 2044 rundll32.exe 4 2044 rundll32.exe 5 2044 rundll32.exe 6 2044 rundll32.exe 7 2044 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2044 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 576 wrote to memory of 2044 576 cmd.exe 27 PID 576 wrote to memory of 2044 576 cmd.exe 27 PID 576 wrote to memory of 2044 576 cmd.exe 27
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\XAnbADuUedJlBE.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\rundll32.exerundll32 uDzpJZuAIMIPqQ.dll,PUpdate2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2044
-