Resubmissions

09-10-2023 22:51

231009-2sv39agh9z 10

12-09-2023 07:48

230912-jnld5sef66 10

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2023 07:48

General

  • Target

    7d968436832d0bc6c0b16629331212f1b92883224345f5265a175a9ad4b6416e.exe

  • Size

    601KB

  • MD5

    ff0da6c21a11802a9de368ba916b7b5b

  • SHA1

    d2225090ebf10b8c504fb018c63eb51276103b20

  • SHA256

    7d968436832d0bc6c0b16629331212f1b92883224345f5265a175a9ad4b6416e

  • SHA512

    990b5e5a0767c39098e31bf84826ca61237240dd52d660cfe075add5baaaba922324202a9d229710318501143af35ffebb79643e941cd0ec151cdaa00418ec40

  • SSDEEP

    12288:drwyo4u1KDhOqNvH4UNWOWITk4d+pddRY2J4zs2kXQz37:drfoODhPvjA4+pdnf4zs2kgL7

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

lnk1

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d968436832d0bc6c0b16629331212f1b92883224345f5265a175a9ad4b6416e.exe
    "C:\Users\Admin\AppData\Local\Temp\7d968436832d0bc6c0b16629331212f1b92883224345f5265a175a9ad4b6416e.exe"
    1⤵
      PID:2364
    • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\Desktop\CompressUndo.ppt"
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2364-0-0x00000000000D0000-0x000000000013E000-memory.dmp

        Filesize

        440KB

      • memory/2364-1-0x0000000000590000-0x0000000000697000-memory.dmp

        Filesize

        1.0MB

      • memory/2364-2-0x0000000000590000-0x0000000000697000-memory.dmp

        Filesize

        1.0MB

      • memory/2680-3-0x000000002DFB0000-0x000000002E1C2000-memory.dmp

        Filesize

        2.1MB

      • memory/2680-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2680-5-0x00000000728AD000-0x00000000728B8000-memory.dmp

        Filesize

        44KB

      • memory/2680-7-0x00000000728AD000-0x00000000728B8000-memory.dmp

        Filesize

        44KB