Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
TA580_20221114.zip/DDmEtxgXtOVOLY.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TA580_20221114.zip/DDmEtxgXtOVOLY.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
TA580_20221114.zip/aGySCShDWxUsAj.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
TA580_20221114.zip/aGySCShDWxUsAj.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
TA580_20221114.zip/project details.lnk
Resource
win7-20220812-en
General
-
Target
TA580_20221114.zip/project details.lnk
-
Size
995B
-
MD5
36c88fc4dad628187c082ebd899d448e
-
SHA1
6e27840f65ed3cc3c2b7af6778219e8681e3ec7a
-
SHA256
e420fc11b53ca2553521adf57668118b494cee687f54f64e79a5558f7a34c30f
-
SHA512
7709b7f348b56889a579da6b4efcc52d73372f3bcc4e0a93c721f6fb76540fc26f2f4aabad36385d291ef804e95efff9dc20bd7bc4e468117cfa29dd47ace6b5
Malware Config
Extracted
bumblebee
1411
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 43 2232 rundll32.exe 49 2232 rundll32.exe 63 2232 rundll32.exe 74 2232 rundll32.exe 79 2232 rundll32.exe 82 2232 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2232 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4964 wrote to memory of 456 4964 cmd.exe 81 PID 4964 wrote to memory of 456 4964 cmd.exe 81 PID 456 wrote to memory of 2232 456 cmd.exe 82 PID 456 wrote to memory of 2232 456 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TA580_20221114.zip\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DDmEtxgXtOVOLY.bat2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\system32\rundll32.exerundll32 aGySCShDWxUsAj.dll,LoadNode3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2232
-
-