Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
XAnbADuUedJlBE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
XAnbADuUedJlBE.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
project details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
project details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
uDzpJZuAIMIPqQ.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
uDzpJZuAIMIPqQ.dll
Resource
win10v2004-20220812-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
602cd18f1efe7bb632476465912c9b1c
-
SHA1
a2f5f20df297f37fc2bb90156db971a3092b3427
-
SHA256
6fb4c22af244bdf6cb2bb520086dd48c01ba547f11b57ffd6c7f6c9aa09af639
-
SHA512
6810bcc2503ef14e42ce6997463375d7c92431774dc0afc22a2e7c5bfb7e1bdb7facaf1b91549c108fc10a4ae7623aa5c0178aad291d70cc30a76f6e495d59d4
Malware Config
Extracted
bumblebee
0811
104.219.233.127:443
192.236.194.101:443
146.70.161.82:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 35 392 rundll32.exe 36 392 rundll32.exe 39 392 rundll32.exe 43 392 rundll32.exe 45 392 rundll32.exe 46 392 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 392 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4936 5004 cmd.exe 80 PID 5004 wrote to memory of 4936 5004 cmd.exe 80 PID 4936 wrote to memory of 392 4936 cmd.exe 81 PID 4936 wrote to memory of 392 4936 cmd.exe 81
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c XAnbADuUedJlBE.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\rundll32.exerundll32 uDzpJZuAIMIPqQ.dll,PUpdate3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:392
-
-