Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2023 01:56
Static task
static1
Behavioral task
behavioral1
Sample
66535813e58e078c4a56c502b6536725080aef5f17abf62f57348a574caccaf5.exe
Resource
win7-20230831-en
General
-
Target
66535813e58e078c4a56c502b6536725080aef5f17abf62f57348a574caccaf5.exe
-
Size
594KB
-
MD5
b397d94493a37c789647bc3d17fa6920
-
SHA1
bd7dabb5c87e9e80160f6da942bfd26849e8494a
-
SHA256
66535813e58e078c4a56c502b6536725080aef5f17abf62f57348a574caccaf5
-
SHA512
67428108465513a9d2b0f62c18a78e20e2b0204beeedd95a948b8587d8bc4d61371158197754fd61fdffb0648f54a9e884fd4f7a4e0629f30654da8ba0ed11b3
-
SSDEEP
12288:zGOWNipODV+gjelTCvc8AtzkvkBFJaC/p5lakvyKmUlZ2j:zGOZYVFjelWkBwv6bp1vcUe
Malware Config
Extracted
bumblebee
lnk1
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{8950AF64-42EF-46E8-BD35-2A7C84399AB0}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\66535813e58e078c4a56c502b6536725080aef5f17abf62f57348a574caccaf5.exe"C:\Users\Admin\AppData\Local\Temp\66535813e58e078c4a56c502b6536725080aef5f17abf62f57348a574caccaf5.exe"1⤵PID:3012
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5c01eaa0bdcd7c30a42bbb35a9acbf574
SHA10aee3e1b873e41d040f1991819d0027b6cc68f54
SHA25632297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40
SHA512d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7