Analysis
-
max time kernel
132s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/11/2022, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
TDGxENRMCBkgkc.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TDGxENRMCBkgkc.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
pFTLNjSsgkkKZo.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
pFTLNjSsgkkKZo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220812-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
df5a41f7e317853827d382e4571d0080
-
SHA1
567a29d53d0ec6cdceef71ce3ae5b5c422a00035
-
SHA256
608900fe841dcedc2dceae20834ed1d492fd0e7625be681c0f608cafe830bd1b
-
SHA512
b827a09d0b26478b9c8219440e9492e02b618ee9685c2afd7895aed6fb0cc042287264581e1432577e48e7a01b33c97d77b8948aeef62b79d20e0785c8c4ca2b
Malware Config
Extracted
bumblebee
1411
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1232 rundll32.exe 3 1232 rundll32.exe 4 1232 rundll32.exe 5 1232 rundll32.exe 6 1232 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1232 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2044 wrote to memory of 880 2044 cmd.exe 27 PID 2044 wrote to memory of 880 2044 cmd.exe 27 PID 2044 wrote to memory of 880 2044 cmd.exe 27 PID 880 wrote to memory of 1232 880 cmd.exe 28 PID 880 wrote to memory of 1232 880 cmd.exe 28 PID 880 wrote to memory of 1232 880 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c TDGxENRMCBkgkc.bat2⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\system32\rundll32.exerundll32 pFTLNjSsgkkKZo.dll,LoadNode3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1232
-
-