Analysis
-
max time kernel
130s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 09:52
Static task
static1
General
-
Target
test.dll
-
Size
1.4MB
-
MD5
064cd8a6423bbbf29c3dcfd9776ad824
-
SHA1
37725d7a9013c7d8febcc23e1da27131491cc033
-
SHA256
49d75cf572dab6bd113256b22298d0ca908d5324d6f7906395ffaa596b4b4ed4
-
SHA512
073be275fa19811e2d62bcce332176be30053dfac6dafc9008668f0220261891f34298f966379af17158e9df26b12bfdb3ab0de9f6fc2019ff649b77d75e12c3
-
SSDEEP
24576:/nFeaeHGgwm2TYJMPS1uXmP80EOYArV7SHvtDTbFJD1c+55D+R6Mm955wo:/nFea9q2TYJMq12rOYArV7SHn11c40
Malware Config
Extracted
bumblebee
9rr
103.175.16.107:443
194.135.33.149:443
154.56.0.241:443
23.254.201.97:443
45.147.229.101:443
185.62.58.169:443
192.236.249.68:443
193.239.84.254:443
37.120.198.248:443
146.19.173.139:443
46.21.153.145:443
149.255.35.134:443
45.147.229.50:443
212.114.52.46:443
103.175.16.122:443
146.19.253.49:443
68.233.238.105:443
64.44.135.250:443
103.175.16.121:443
64.44.102.6:443
192.119.64.21:443
79.110.52.56:443
192.236.161.191:443
185.156.172.123:443
54.38.136.187:443
63.141.248.253:443
192.236.194.136:443
193.239.84.247:443
154.56.0.221:443
64.44.101.250:443
103.175.16.117:443
146.70.104.250:443
103.175.16.108:443
185.62.58.133:443
194.135.33.148:443
193.233.203.156:443
145.239.135.155:443
146.70.125.82:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Wine rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1476 1296 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4772 powershell.exe 4772 powershell.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe 3104 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4772 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3104 4772 powershell.exe 99 PID 4772 wrote to memory of 3104 4772 powershell.exe 99 PID 4772 wrote to memory of 384 4772 powershell.exe 101 PID 4772 wrote to memory of 384 4772 powershell.exe 101
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\test.dll,#11⤵PID:4708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1892
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 1296 -ip 12961⤵PID:2276
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1296 -s 17641⤵
- Program crash
PID:1476
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" .\test.dll,ajwGwRKhLi2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" .\test.dll,ajwGwRKhLi2⤵PID:384
-