Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-11-2022 10:31
Static task
static1
Behavioral task
behavioral1
Sample
UkBuGFiaRxAAfl.dll
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
UkBuGFiaRxAAfl.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
UkBuGFiaRxAAfl.dll
-
Size
970KB
-
MD5
a779d5cf3fa450bdf0f540054861ba62
-
SHA1
4fe25852f69640e87e240b5e4bc46fdfc76782c7
-
SHA256
2911bdd99140387cbc8761826aacc3c9de0ccb511255aa58790955d8337e2edf
-
SHA512
1db51d312dfa647038d2c0c9afbd11852b4bdb177a07894f84db04d3547a3d06257900c597f9bb514bfcdcfd027fbcbe22552dbf73262f8f6e30920025ea3f50
-
SSDEEP
12288:ZZ33fS04yxlif6aS8dqJJzkvyo4w9faJ+1NEDeX4d8FWkPQz8028ez+R7Fnjmz2q:ZZ33agIddqFY9CJ+1V4oWdY8ec7BjI4
Malware Config
Extracted
Family
bumblebee
Botnet
1711
C2
193.200.16.175:443
54.37.130.195:443
64.44.97.58:443
rc4.plain
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 1704 rundll32.exe 4 1704 rundll32.exe 5 1704 rundll32.exe 6 1704 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1704 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1712 1764 WerFault.exe 15 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1712 1764 rundll32.exe 28 PID 1764 wrote to memory of 1712 1764 rundll32.exe 28 PID 1764 wrote to memory of 1712 1764 rundll32.exe 28 PID 932 wrote to memory of 1628 932 cmd.exe 34 PID 932 wrote to memory of 1628 932 cmd.exe 34 PID 932 wrote to memory of 1628 932 cmd.exe 34 PID 932 wrote to memory of 1704 932 cmd.exe 35 PID 932 wrote to memory of 1704 932 cmd.exe 35 PID 932 wrote to memory of 1704 932 cmd.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\UkBuGFiaRxAAfl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1764 -s 842⤵
- Program crash
PID:1712
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1412
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\rundll32.exerundll32.exe UkBuGFiaRxAAfl.dll #12⤵PID:1628
-
-
C:\Windows\system32\rundll32.exerundll32.exe UkBuGFiaRxAAfl.dll #22⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1704
-