Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-11-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
XAnbADuUedJlBE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XAnbADuUedJlBE.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
project details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
project details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
uDzpJZuAIMIPqQ.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
uDzpJZuAIMIPqQ.dll
Resource
win10v2004-20220812-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
602cd18f1efe7bb632476465912c9b1c
-
SHA1
a2f5f20df297f37fc2bb90156db971a3092b3427
-
SHA256
6fb4c22af244bdf6cb2bb520086dd48c01ba547f11b57ffd6c7f6c9aa09af639
-
SHA512
6810bcc2503ef14e42ce6997463375d7c92431774dc0afc22a2e7c5bfb7e1bdb7facaf1b91549c108fc10a4ae7623aa5c0178aad291d70cc30a76f6e495d59d4
Malware Config
Extracted
bumblebee
0811
104.219.233.127:443
192.236.194.101:443
146.70.161.82:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1768 rundll32.exe 3 1768 rundll32.exe 4 1768 rundll32.exe 5 1768 rundll32.exe 6 1768 rundll32.exe 7 1768 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1768 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1976 wrote to memory of 976 1976 cmd.exe 27 PID 1976 wrote to memory of 976 1976 cmd.exe 27 PID 1976 wrote to memory of 976 1976 cmd.exe 27 PID 976 wrote to memory of 1768 976 cmd.exe 28 PID 976 wrote to memory of 1768 976 cmd.exe 28 PID 976 wrote to memory of 1768 976 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c XAnbADuUedJlBE.bat2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\rundll32.exerundll32 uDzpJZuAIMIPqQ.dll,PUpdate3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1768
-
-