Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
RzTgomzVMyYvLc.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RzTgomzVMyYvLc.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
nCguwHABqhXZAo.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
nCguwHABqhXZAo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220901-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
8c1154a1673b2f2839b02647c6b2cb90
-
SHA1
06d134201da42ad5096f1e71fd67b5b912a06cb2
-
SHA256
cb19b2eb0143e6def46886c9c3e32e4fdbd22bd577d67bb9a16b437183869e0f
-
SHA512
3fb04105d57344f0148097cbf9d5f52f694d65e9d3c5a41614b3fed3f0f2b30bdc5b9d3f26674b228326c714c067b2d40a013ff342fef337055fa129ea1ca6d9
Malware Config
Extracted
bumblebee
1011
104.219.233.38:443
192.119.120.22:443
146.59.116.242:443
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 30 4640 rundll32.exe 33 4640 rundll32.exe 35 4640 rundll32.exe 37 4640 rundll32.exe 38 4640 rundll32.exe 39 4640 rundll32.exe 40 4640 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4640 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 3556 904 cmd.exe 79 PID 904 wrote to memory of 3556 904 cmd.exe 79 PID 3556 wrote to memory of 4640 3556 cmd.exe 80 PID 3556 wrote to memory of 4640 3556 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c RzTgomzVMyYvLc.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\rundll32.exerundll32 nCguwHABqhXZAo.dll,mruAlloc3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4640
-
-