Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 20:26
Static task
static1
Behavioral task
behavioral1
Sample
week.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
week.dll
-
Size
925KB
-
MD5
8c99216011886a809be0b08f5128b91c
-
SHA1
a6c2eb84abdd08b894b6f4daa64e1cf367481193
-
SHA256
b90f420b5e66c7f9c24c75bc0553d250bb0d79df2be0b0738625cb7159d86fa7
-
SHA512
c9a4acf7b1cda0d2617c69bb5c8cbd28b530f856d271e2dc7c08bd75d60dedd8393e23901e63b4c23de4833be4997ddc9b245fb90231922d14e2a38e03b5635c
-
SSDEEP
24576:i+meq+lHCu0cja71hbkGeVdf36dPsxg/MP:vmeq+whtkFNg/k
Malware Config
Extracted
Family
bumblebee
Botnet
0112
C2
172.86.123.150:443
91.245.253.76:443
23.106.223.1:443
rc4.plain
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 2 1544 rundll32.exe 3 1544 rundll32.exe 28 1544 rundll32.exe 31 1544 rundll32.exe 53 1544 rundll32.exe 69 1544 rundll32.exe 72 1544 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{78A957CE-2CA0-4BE3-B1D0-0C61CC558481}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8307354D-447E-4C02-BDC9-5ECEC07B8C3A}.catalogItem svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1544 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\week.dll,#11⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:5024