Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-11-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
TDGxENRMCBkgkc.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TDGxENRMCBkgkc.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
pFTLNjSsgkkKZo.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
pFTLNjSsgkkKZo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220812-en
General
-
Target
TDGxENRMCBkgkc.bat
-
Size
1KB
-
MD5
372223c90e92c1bd3333eb5175375d10
-
SHA1
bb4892289f99f41a5a56e18db703149ea80040f6
-
SHA256
7a2b6dcdba0158d583d37512ddcfe816d31124c3234498a5910dac141869ffdd
-
SHA512
010a7cce6c6c91c3716ec3dadfabb534c65a2a9e07b429b42ac62b3bcce1748f69d998d46370c36e2dccdac8e393e7b1681dd0aa09102fa7e416fcb56f9c0c87
Malware Config
Extracted
bumblebee
1411
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1672 rundll32.exe 3 1672 rundll32.exe 4 1672 rundll32.exe 5 1672 rundll32.exe 6 1672 rundll32.exe 7 1672 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1672 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1672 1076 cmd.exe 29 PID 1076 wrote to memory of 1672 1076 cmd.exe 29 PID 1076 wrote to memory of 1672 1076 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\TDGxENRMCBkgkc.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\rundll32.exerundll32 pFTLNjSsgkkKZo.dll,LoadNode2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1672
-