Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
TDGxENRMCBkgkc.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TDGxENRMCBkgkc.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
pFTLNjSsgkkKZo.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
pFTLNjSsgkkKZo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20220812-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
df5a41f7e317853827d382e4571d0080
-
SHA1
567a29d53d0ec6cdceef71ce3ae5b5c422a00035
-
SHA256
608900fe841dcedc2dceae20834ed1d492fd0e7625be681c0f608cafe830bd1b
-
SHA512
b827a09d0b26478b9c8219440e9492e02b618ee9685c2afd7895aed6fb0cc042287264581e1432577e48e7a01b33c97d77b8948aeef62b79d20e0785c8c4ca2b
Malware Config
Extracted
bumblebee
1411
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 28 4712 rundll32.exe 37 4712 rundll32.exe 39 4712 rundll32.exe 42 4712 rundll32.exe 44 4712 rundll32.exe 45 4712 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4712 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3896 2324 cmd.exe 83 PID 2324 wrote to memory of 3896 2324 cmd.exe 83 PID 3896 wrote to memory of 4712 3896 cmd.exe 84 PID 3896 wrote to memory of 4712 3896 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c TDGxENRMCBkgkc.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\rundll32.exerundll32 pFTLNjSsgkkKZo.dll,LoadNode3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4712
-
-