Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2023 17:45

General

  • Target

    Inv(05-19)Copy#17-42-47.js

  • Size

    764KB

  • MD5

    b0a6293b17d888d5bbb00a2eec43bedd

  • SHA1

    72ab1b2ab9e390ea842730aa78ed1d26561fdca2

  • SHA256

    00ec8f3900336c7aeb31fef4d111ee6e33f12ad451bc5119d3e50ad80b2212b0

  • SHA512

    d8c8bf15ab301fa25461a96add2d94fb799220390a358cad31bbd8ad4df41d2ff4f6ccead5129d24b5592cfa3d9230a32394f89318bc53cfe540fc6b27557d51

  • SSDEEP

    12288:qo3Npw3bC42p8hQbShsCO8j5o08jGd963H+Y5a5zn75H5ZC5aerQM+ZzFWX8lLG2:qo3nIApkQbSX5jS08qdkn5azn715ZC58

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

mc1905

C2

92.119.178.40:443

32.54.188.44:443

194.135.33.160:443

192.198.82.59:443

103.175.16.151:443

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Blocklisted process makes network request 11 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Inv(05-19)Copy#17-42-47.js
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\990566.dat,eOXScagadNKe
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of NtCreateThreadExHideFromDebugger
      PID:340
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\279531.dat,eOXScagadNKe
      2⤵
      • Loads dropped DLL
      • Suspicious use of NtCreateThreadExHideFromDebugger
      PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar3CF9.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\279531.dat

    Filesize

    1.2MB

    MD5

    0808f27a101bef2a258fa07bf3e00e19

    SHA1

    bc2a1c3b6eb916be35ac38fea80ec1187185e707

    SHA256

    34768877e73cb3fd875e43d03bea2bef681dea6356b6f1e4949f968685967df8

    SHA512

    426703cbef316b2d30362b628d972766161589ef7f7713e9e085c69ace79054c2a2c536f77967924f3c366b1d9022378cf9935cc6d6cbe2097738277b4edd70d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\990566.dat

    Filesize

    1.2MB

    MD5

    28348d4c5cf61fedfac24b04cc861667

    SHA1

    aeb115fedc21683559d9fb7681849fd7a599c0e3

    SHA256

    6bd7a7e68c336a18869182b2ab649d5b854d61ab590403749c393ae2a8ccb0d0

    SHA512

    a2a0a8769df4d1656a219fa317d95b9f16575574e8ce501a3c49be90be1333d6a481e219e714270b2e2df3c9f16df3d3aea91dd14d385e386d30ad0ab8d54fd2

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\279531.dat

    Filesize

    1.2MB

    MD5

    0808f27a101bef2a258fa07bf3e00e19

    SHA1

    bc2a1c3b6eb916be35ac38fea80ec1187185e707

    SHA256

    34768877e73cb3fd875e43d03bea2bef681dea6356b6f1e4949f968685967df8

    SHA512

    426703cbef316b2d30362b628d972766161589ef7f7713e9e085c69ace79054c2a2c536f77967924f3c366b1d9022378cf9935cc6d6cbe2097738277b4edd70d

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\990566.dat

    Filesize

    1.2MB

    MD5

    28348d4c5cf61fedfac24b04cc861667

    SHA1

    aeb115fedc21683559d9fb7681849fd7a599c0e3

    SHA256

    6bd7a7e68c336a18869182b2ab649d5b854d61ab590403749c393ae2a8ccb0d0

    SHA512

    a2a0a8769df4d1656a219fa317d95b9f16575574e8ce501a3c49be90be1333d6a481e219e714270b2e2df3c9f16df3d3aea91dd14d385e386d30ad0ab8d54fd2

  • memory/340-117-0x0000000002020000-0x0000000002181000-memory.dmp

    Filesize

    1.4MB

  • memory/340-118-0x00000000001F0000-0x000000000026F000-memory.dmp

    Filesize

    508KB

  • memory/340-119-0x0000000002020000-0x0000000002181000-memory.dmp

    Filesize

    1.4MB

  • memory/340-120-0x0000000002020000-0x0000000002181000-memory.dmp

    Filesize

    1.4MB

  • memory/1900-121-0x0000000001F90000-0x00000000020F1000-memory.dmp

    Filesize

    1.4MB

  • memory/1900-122-0x0000000001DB0000-0x0000000001E2F000-memory.dmp

    Filesize

    508KB