Analysis
-
max time kernel
129s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
DyNNDCUAhTtInE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DyNNDCUAhTtInE.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
aBZbMXVgKCtmcQ.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
aBZbMXVgKCtmcQ.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20221111-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
8c58b17748b7acd6158f3d604997e591
-
SHA1
8501dd4d0f7ff82474e01faa3201e3fc03a14fd0
-
SHA256
91dd90e5cfd696089fce2e79f4caacd691fd6488ca2ff821bb1b740805826b94
-
SHA512
355a641308634de1fbfbf7300de3736c39f9fa233a59589f70ec1c051e08ad2a495c4e6c962e9aa130a5a741ba79ad9e3367e78ebc43cdcc32e39ac8f5f37c52
Malware Config
Extracted
bumblebee
1711
193.200.16.175:443
54.37.130.195:443
64.44.97.58:443
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1508 rundll32.exe 3 1508 rundll32.exe 4 1508 rundll32.exe 5 1508 rundll32.exe 6 1508 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1508 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1816 1236 cmd.exe 29 PID 1236 wrote to memory of 1816 1236 cmd.exe 29 PID 1236 wrote to memory of 1816 1236 cmd.exe 29 PID 1816 wrote to memory of 1508 1816 cmd.exe 30 PID 1816 wrote to memory of 1508 1816 cmd.exe 30 PID 1816 wrote to memory of 1508 1816 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DyNNDCUAhTtInE.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\rundll32.exerundll32 aBZbMXVgKCtmcQ.dll,CheckSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1508
-
-