Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 02:50
Static task
static1
Behavioral task
behavioral1
Sample
malicious/HUeLjsrbrChRXV.bat
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
malicious/eXrZsNsGUlguMh.dll
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
General
-
Target
malicious/HUeLjsrbrChRXV.bat
-
Size
1KB
-
MD5
834daa3583a380ed808b4b3f7cc53744
-
SHA1
70d878eff559dc9af26e2a3f27defa58a21a69b9
-
SHA256
344ec9189a2b37185cd0e5fa8c06b47daa10040fcc47e75d592e5e49874e8412
-
SHA512
6bb7c2740f0dd07a930935a0b683315fd6ce3645f44086fa326f80b309cd946778f2b7365b910c9b101e6a4a21866e4c4d2cc6a856243de47d7506ffdae019a1
Malware Config
Extracted
Family
bumblebee
Botnet
1411
C2
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
rc4.plain
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 1656 rundll32.exe 3 1656 rundll32.exe 4 1656 rundll32.exe 5 1656 rundll32.exe 6 1656 rundll32.exe 7 1656 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1656 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1656 1112 cmd.exe 29 PID 1112 wrote to memory of 1656 1112 cmd.exe 29 PID 1112 wrote to memory of 1656 1112 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\malicious\HUeLjsrbrChRXV.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\rundll32.exerundll32 eXrZsNsGUlguMh.dll,LoadNode2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1656
-