Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2023 08:51

General

  • Target

    a6ac1a8bb63362ed7515f2ca02fb52be.dll

  • Size

    1.1MB

  • MD5

    a6ac1a8bb63362ed7515f2ca02fb52be

  • SHA1

    8781347d2e723f823d5b996bc22389b14a4a72c8

  • SHA256

    e1dbce8a89b5fea0f3cf6da9560fd573dfe9c93c5d6d8d2fef8902a3589cdf15

  • SHA512

    6f01f0a630afff0dd71c5e457c8dbdb3a7743fb6337740384e034dad0d6b3f002992f2df5c953f223f8b2589098c43640b705a25482ed1c939a61b6dd783392d

  • SSDEEP

    24576:K40kaG+iDe5cMQW7v7+KIUC/ofj1fpLgN:K40kd+35cMv

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

js1

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a webshell malware written in C++.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a6ac1a8bb63362ed7515f2ca02fb52be.dll
    1⤵
    • Suspicious use of NtCreateThreadExHideFromDebugger
    PID:1116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1116-0-0x0000000001E60000-0x0000000001ED9000-memory.dmp

    Filesize

    484KB

  • memory/1116-1-0x0000000077740000-0x00000000778E9000-memory.dmp

    Filesize

    1.7MB

  • memory/1116-2-0x0000000001FF0000-0x00000000020FA000-memory.dmp

    Filesize

    1.0MB

  • memory/1116-4-0x0000000077740000-0x00000000778E9000-memory.dmp

    Filesize

    1.7MB

  • memory/1116-5-0x0000000001FF0000-0x00000000020FA000-memory.dmp

    Filesize

    1.0MB

  • memory/1116-6-0x0000000001FF0000-0x00000000020FA000-memory.dmp

    Filesize

    1.0MB

  • memory/1116-7-0x0000000001E60000-0x0000000001ED9000-memory.dmp

    Filesize

    484KB

  • memory/1116-8-0x0000000077740000-0x00000000778E9000-memory.dmp

    Filesize

    1.7MB