Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2022 19:06
Static task
static1
Behavioral task
behavioral1
Sample
XAnbADuUedJlBE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XAnbADuUedJlBE.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
project details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
project details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
uDzpJZuAIMIPqQ.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
uDzpJZuAIMIPqQ.dll
Resource
win10v2004-20220812-en
General
-
Target
XAnbADuUedJlBE.bat
-
Size
1KB
-
MD5
8ae47905093ff8acd0fc3f023a30bbdc
-
SHA1
184fc76e91488b8ad5b3041153ba8d9a98eafc07
-
SHA256
7dfb2ecf76c386504119056d20f3a65d83f7bb3f297e2f63aa63b2e205c72105
-
SHA512
24e7ad5726e69f160dee69d103f6674bf929813763d1d2ae46bdd6132b3e8851de67c8171a53223a05dd1fcc9823becaefd108b7db8ab185d2a8bc8a3b150346
Malware Config
Extracted
bumblebee
0811
104.219.233.127:443
192.236.194.101:443
146.70.161.82:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 10 4424 rundll32.exe 29 4424 rundll32.exe 38 4424 rundll32.exe 42 4424 rundll32.exe 43 4424 rundll32.exe 45 4424 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4424 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4204 wrote to memory of 4424 4204 cmd.exe 83 PID 4204 wrote to memory of 4424 4204 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\XAnbADuUedJlBE.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\system32\rundll32.exerundll32 uDzpJZuAIMIPqQ.dll,PUpdate2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4424
-