Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-02-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll
Resource
win7-20240221-en
General
-
Target
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll
-
Size
2.6MB
-
MD5
39fb644929c57fb75aace407f429cb12
-
SHA1
f449e79493fcf15dc870466e2ea639d2cbcd8e14
-
SHA256
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4
-
SHA512
b32fbd9bc5a58a449199d11decbd1006571ccc849dfcc839477bc457f522fe9f2ca11f3d55ef31978ac0c5e0f811b6e339ecef4c64724b7cf4aedf8d524daade
-
SSDEEP
49152:K61vkm5V04xOerjOXpe6ZZ1S71F1Q6pn2OL4wC548J3Y5kU:K6Nkm5V04xOerjOXpe2Z1S71UgLq5JJ
Malware Config
Extracted
bumblebee
25html
23.83.134.136:443
138.201.190.52:443
Signatures
-
Detects executables referencing many IR and analysis tools 3 IoCs
resource yara_rule behavioral1/memory/2892-2-0x0000000001F90000-0x00000000021DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral1/memory/2892-0-0x0000000001F90000-0x00000000021DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral1/memory/2892-9-0x0000000001F90000-0x00000000021DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\SOFTWARE\Wine rundll32.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN rundll32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe 2892 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll,#11⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:2892