Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10-11-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
RzTgomzVMyYvLc.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RzTgomzVMyYvLc.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
nCguwHABqhXZAo.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
nCguwHABqhXZAo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
8c1154a1673b2f2839b02647c6b2cb90
-
SHA1
06d134201da42ad5096f1e71fd67b5b912a06cb2
-
SHA256
cb19b2eb0143e6def46886c9c3e32e4fdbd22bd577d67bb9a16b437183869e0f
-
SHA512
3fb04105d57344f0148097cbf9d5f52f694d65e9d3c5a41614b3fed3f0f2b30bdc5b9d3f26674b228326c714c067b2d40a013ff342fef337055fa129ea1ca6d9
Malware Config
Extracted
bumblebee
1011
104.219.233.38:443
192.119.120.22:443
146.59.116.242:443
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 1 548 rundll32.exe 3 548 rundll32.exe 4 548 rundll32.exe 5 548 rundll32.exe 6 548 rundll32.exe 7 548 rundll32.exe 8 548 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 548 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1296 1768 cmd.exe 28 PID 1768 wrote to memory of 1296 1768 cmd.exe 28 PID 1768 wrote to memory of 1296 1768 cmd.exe 28 PID 1296 wrote to memory of 548 1296 cmd.exe 29 PID 1296 wrote to memory of 548 1296 cmd.exe 29 PID 1296 wrote to memory of 548 1296 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c RzTgomzVMyYvLc.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\rundll32.exerundll32 nCguwHABqhXZAo.dll,mruAlloc3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:548
-
-