Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 05:52
Static task
static1
Behavioral task
behavioral1
Sample
Quote.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quote.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
quotefile.ps1
Resource
win7-20230220-en
General
-
Target
quotefile.ps1
-
Size
1.9MB
-
MD5
739eaf406607fa3efddb9c6c97cdba76
-
SHA1
bdb0575775a3447391b9d719e6d69c0e44549fd2
-
SHA256
d6cc3ac995484b99ed790b6f8ceb145492794eb5d01ec4a71123b9975e9bfd20
-
SHA512
80ccebc7f4ff3597031899973817acdb4c1638788aa37b536fcafb6cd03b2f6113d40527b2e7a7f49d4794f021c815f8dc85ac4fd372d40cde59da6db2769384
-
SSDEEP
24576:AzrIw+80AssR3D6UN6hzwbSVsi5MW94d5upIAMoIKAdqQb16:AwwahXsvWK1dj6
Malware Config
Extracted
bumblebee
Extracted
bumblebee
1508
172.93.201.138:443
116.142.140.251:443
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest powershell.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ powershell.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ powershell.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ powershell.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions powershell.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 24 2472 powershell.exe 50 2472 powershell.exe 70 2472 powershell.exe 72 2472 powershell.exe 74 2472 powershell.exe 75 2472 powershell.exe 76 2472 powershell.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion powershell.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Wine powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2472 powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2472 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2940 2472 powershell.exe 87 PID 2472 wrote to memory of 2940 2472 powershell.exe 87 PID 2940 wrote to memory of 408 2940 csc.exe 88 PID 2940 wrote to memory of 408 2940 csc.exe 88 PID 2472 wrote to memory of 3664 2472 powershell.exe 89 PID 2472 wrote to memory of 3664 2472 powershell.exe 89 PID 3664 wrote to memory of 3952 3664 csc.exe 90 PID 3664 wrote to memory of 3952 3664 csc.exe 90
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\quotefile.ps11⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Blocklisted process makes network request
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yccpyfx0\yccpyfx0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES86A9.tmp" "c:\Users\Admin\AppData\Local\Temp\yccpyfx0\CSCB71E333A4AD74C9EA2CCBC21A438B34.TMP"3⤵PID:408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3zwqoftw\3zwqoftw.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD6B.tmp" "c:\Users\Admin\AppData\Local\Temp\3zwqoftw\CSC179C15A8DDF343559166677868BCFC7.TMP"3⤵PID:3952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59c81c313fadd8c7a2063f70df53f60a6
SHA19614441634d7275f0fcceb4dd312aa244a804dff
SHA25661b8698967025619b96c7fc7599772ef37bf8d2c22d6450ea22cad6d46c60eab
SHA512a9e114772ff71236aa0e5f0e7a2765239983c6fb9de5992e6645cd8b0b73469f2619955c95fc8c6efde8e2db377c9d5ca285de491ee4e83c4764b5f9d8fa259c
-
Filesize
1KB
MD58292a1b111ab2f1435a30f62557aa481
SHA180ba25c46a4ca008a837e033119e4f0dc8b2fe0d
SHA256f2c50d8339e7b4b6382887b4012415c5fadd019c9958bcfd7e89bf3210064ced
SHA51252f6f1bdd3016f1bb263eccd30c493cd9904805c33c045b0bb100607a611959e30204780f939f940521c4b0e7b288fb40b988c3beb4c8e6f8426813efa1a9538
-
Filesize
1KB
MD58e1a947a2e97577ea9b614089ad54cc9
SHA1248ca7c4ad4ecdccdb1c578569db2f277b66a74a
SHA256c8aeb4fae33154f724d9364a9fcd7574d6ef808eb70d01342f28b25e9c1e4932
SHA512a5b6ba2add16f5d682fa6968134ffa014edecfec7b18c678468772ed0fbc4325ee114a707b2785307ce97e424b993996b8b46cdb532876fa9d0b813f6350c6c2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5adfe1a63b02d4a6a254166d73b6d6ebb
SHA1324d9bd804f4e29662ef145fe55e177bd842020f
SHA2568ed5f2c4db419011653da9cc3f72f0f3a4f7c0d46dcd85cc594dff6f56694d04
SHA512ddb1cfac2fa5ebec43c7e8ffa9624db39c7e1606c1c8dad175a2e0b15efcb03591c9615441d060145376702c3a4fb6c38bfb465b4ddd5e2042a31ddc13bc82b2
-
Filesize
591B
MD59b5ca5987d03f2fda2d89b3225bb527b
SHA12fca70ccb8428eda41cb29785458155942e24da3
SHA256e47533d0cbe442ac6b5bd50e507c9dae2c9f19ee4c0ffbc2273375f0721efaa8
SHA5128e2c4ae7b952998cb6efaeaee6f274efb879f3c1bf657d83391ddf7ea291b4927204e5c2d67877b820a35a67d39dfe857b9f4725085062cae75bc871d657a7bf
-
Filesize
369B
MD5714f940388a38500c2e6a60ade20e60f
SHA1ca596cfdf37d7422e50f8304a5886af3694b8dcc
SHA2569109e241ae952851b226836b57af0f414c705b58466495601df80803ba84ca3e
SHA5123add48abd49a63a9985b1a56a50d921becdc3356d4e376a0a3cb719a1cf04865fcd662da7c964c5f7dc01500391494a6eb04252efd9d9fd027f756311e01f9d8
-
Filesize
652B
MD5cfef5c659ad26ce8ae0402577195902f
SHA16aab0017c6a69b47f1adbbed809970ec36f75d4f
SHA256a00e1782e828b23a719f9a6fe8d8dccce1d60daa8232f29a0d62084b5fa691f5
SHA51290e1518807cca9d6da9f3b217cdbba6bf6227d6f3f94a71313abd29fd7866795c8cc369c601c1c7f6a8c351f7c5d2ba2a5cf32c4a7e4cceb618cea81dee7b98a
-
Filesize
652B
MD580d3624f5be1889b58bfe4ffc5093bd0
SHA1c13cdf5aecdcbfb43008458e82d0eda3bf9e765c
SHA256dbfd0dcd979a52065581e5d333ca97596de5dad9605d8dffb4a7aaa92c7a70e4
SHA5125baa36be72d87dbd7226aeacb9ed38f6a9755fdd4751b5d8da5e529d2efce26c0e53edf452e88e3b233751de75098f33826d64b9db20bb1b4c9b8b2a87d94fd2
-
Filesize
203B
MD5b611be9282deb44eed731f72bcbb2b82
SHA1cc1d606d853bbabd5fef87255356a0d54381c289
SHA256ee09fdd61a05266e4e09f418fc6a452f1205d9f29afba6b8a1579333dc3ff3b6
SHA51263b5ad7b65fd4866fb8841e4eee567e4f1e7888bb9fda8dd5c8dca3461d084d3f80ce920ae321609e4ff32ba13a55b7320282ce7201bb74a793d4700240360a4
-
Filesize
369B
MD56d7c7bd5836e932d62efcb87aff20805
SHA12d119001de7460d0eaa10bfdebf793fe89f5335d
SHA2562b0014b269a8e5b987a8ed6ee47f163adca1e61fa6e66baec42af1f66c1bdb73
SHA51224f1e0683cc780042b84b919a42c09815d80bede1d90aabe10a90d8d74b9454915e20a337857b6a0678c5b9c5e7a9f97a563e16bdd7a65603a622289a9d2bb29