Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 02:50
Static task
static1
Behavioral task
behavioral1
Sample
malicious/HUeLjsrbrChRXV.bat
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
malicious/eXrZsNsGUlguMh.dll
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
General
-
Target
malicious/project details.lnk
-
Size
995B
-
MD5
ec8f76a02f7125a76f3c0413d95a0bda
-
SHA1
56a33acc112261c0c4a4f0e1d730688e08a13464
-
SHA256
d2f0c9e1c6763b2c92f934df6870e69df0143f5d9fa55a0a042e1cde13b888ff
-
SHA512
96374f8aef55f43095b4b614abb9066e922e0cbdacad00732ee0a20a1e4cbc30876831a6b2c7dbe83216680c2313b5952f55f232b4b675522a289d36b086f549
Malware Config
Extracted
Family
bumblebee
Botnet
1411
C2
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
rc4.plain
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 1 288 rundll32.exe 3 288 rundll32.exe 4 288 rundll32.exe 5 288 rundll32.exe 6 288 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 288 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1132 wrote to memory of 832 1132 cmd.exe 29 PID 1132 wrote to memory of 832 1132 cmd.exe 29 PID 1132 wrote to memory of 832 1132 cmd.exe 29 PID 832 wrote to memory of 288 832 cmd.exe 30 PID 832 wrote to memory of 288 832 cmd.exe 30 PID 832 wrote to memory of 288 832 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\malicious\project details.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c HUeLjsrbrChRXV.bat2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\rundll32.exerundll32 eXrZsNsGUlguMh.dll,LoadNode3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:288
-
-