Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll
Resource
win7-20240221-en
General
-
Target
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll
-
Size
2.6MB
-
MD5
39fb644929c57fb75aace407f429cb12
-
SHA1
f449e79493fcf15dc870466e2ea639d2cbcd8e14
-
SHA256
a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4
-
SHA512
b32fbd9bc5a58a449199d11decbd1006571ccc849dfcc839477bc457f522fe9f2ca11f3d55ef31978ac0c5e0f811b6e339ecef4c64724b7cf4aedf8d524daade
-
SSDEEP
49152:K61vkm5V04xOerjOXpe6ZZ1S71F1Q6pn2OL4wC548J3Y5kU:K6Nkm5V04xOerjOXpe2Z1S71UgLq5JJ
Malware Config
Extracted
bumblebee
25html
23.83.134.136:443
138.201.190.52:443
Signatures
-
Detects executables referencing many IR and analysis tools 15 IoCs
resource yara_rule behavioral2/memory/4128-2-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-0-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-9-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-10-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-12-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-13-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-14-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-15-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-16-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-17-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-18-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-19-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-20-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-21-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools behavioral2/memory/4128-22-0x0000021FBE790000-0x0000021FBE9DB000-memory.dmp INDICATOR_SUSPICIOUS_References_SecTools -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService rundll32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 24 4128 rundll32.exe 33 4128 rundll32.exe 34 4128 rundll32.exe 42 4128 rundll32.exe 46 4128 rundll32.exe 47 4128 rundll32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Wine rundll32.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a54302b0bf056c65deb759122f71e757b11155d82e648f9e206dab91aab44bd4.dll,#11⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Blocklisted process makes network request
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:2860