Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2022 20:17
Static task
static1
Behavioral task
behavioral1
Sample
DyNNDCUAhTtInE.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DyNNDCUAhTtInE.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
aBZbMXVgKCtmcQ.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
aBZbMXVgKCtmcQ.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
project details.lnk
Resource
win7-20221111-en
General
-
Target
project details.lnk
-
Size
995B
-
MD5
8c58b17748b7acd6158f3d604997e591
-
SHA1
8501dd4d0f7ff82474e01faa3201e3fc03a14fd0
-
SHA256
91dd90e5cfd696089fce2e79f4caacd691fd6488ca2ff821bb1b740805826b94
-
SHA512
355a641308634de1fbfbf7300de3736c39f9fa233a59589f70ec1c051e08ad2a495c4e6c962e9aa130a5a741ba79ad9e3367e78ebc43cdcc32e39ac8f5f37c52
Malware Config
Extracted
bumblebee
1711
193.200.16.175:443
54.37.130.195:443
64.44.97.58:443
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 18 1912 rundll32.exe 23 1912 rundll32.exe 26 1912 rundll32.exe 28 1912 rundll32.exe 32 1912 rundll32.exe 33 1912 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1912 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3028 4144 cmd.exe 83 PID 4144 wrote to memory of 3028 4144 cmd.exe 83 PID 3028 wrote to memory of 1912 3028 cmd.exe 84 PID 3028 wrote to memory of 1912 3028 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project details.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DyNNDCUAhTtInE.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\rundll32.exerundll32 aBZbMXVgKCtmcQ.dll,CheckSettings3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1912
-
-