ProcessLoad
Behavioral task
behavioral1
Sample
186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba.exe
Resource
win10v2004-20231215-en
General
-
Target
186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba
-
Size
2.1MB
-
MD5
87d3e33a513772706c9b0b7a42151928
-
SHA1
f906051f2b1f5251a5138af2013376632f7aee58
-
SHA256
186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba
-
SHA512
189ea7b4e343f99d6b7a06182876f2ab31af9786d01330becd3c9b2578d8e350ef920062e27d20a425a6204f714b4a8567f6b6a86a87624f953fd7552a546c93
-
SSDEEP
49152:NiCsh74TQUm5D0/pwphZ+byFW1igxwlqPGOg1a:K2xlALay+LxO1Oj
Malware Config
Extracted
bumblebee
VPS1G
23.82.19.208:443
Signatures
-
Bumblebee family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba
Files
-
186145f84ed6a473ec6bc4afa66bff156057888938793b12afd17659041ddbba.exe windows:6 windows x64 arch:x64
e540de65c610ff7d74677289a61a259e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
TlsAlloc
QueueUserAPC
CreateWaitableTimerA
DeleteCriticalSection
VerSetConditionMask
SleepEx
TlsGetValue
GetSystemTimeAsFileTime
TlsFree
CreateIoCompletionPort
FileTimeToSystemTime
LoadLibraryW
GetLocalTime
GetProcAddress
SystemTimeToFileTime
GetModuleHandleW
GetCurrentProcess
Thread32Next
Thread32First
GetModuleHandleA
OpenProcess
LoadLibraryA
VirtualProtectEx
OpenThread
GetStdHandle
GetFileType
WriteFile
MultiByteToWideChar
SwitchToFiber
DeleteFiber
CreateFiber
WideCharToMultiByte
ConvertFiberToThread
ConvertThreadToFiber
QueryPerformanceCounter
GetTickCount
GlobalMemoryStatus
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
GetSystemTime
ReadFile
GetModuleFileNameW
SetFilePointer
lstrlenA
CreateFileW
lstrcmpA
TerminateThread
HeapFree
CreateFileA
HeapReAlloc
HeapAlloc
GetFileSize
GetProcessHeap
GetFullPathNameW
GetCurrentDirectoryW
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
SetEvent
CreateEventW
PostQueuedCompletionStatus
WaitForSingleObject
GetQueuedCompletionStatus
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForMultipleObjects
EnterCriticalSection
SetLastError
VerifyVersionInfoA
TlsSetValue
SetWaitableTimer
GetCurrentProcessId
ExitProcess
GetLastError
GetModuleHandleExA
Sleep
lstrcatA
GetDriveTypeW
FindFirstFileW
SetEndOfFile
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
OutputDebugStringW
SetStdHandle
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
WriteConsoleW
SetConsoleCtrlHandler
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
FreeLibrary
CreateDirectoryA
GetFileAttributesA
GetModuleFileNameA
CloseHandle
CreateToolhelp32Snapshot
RtlUnwindEx
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
FormatMessageA
LocalFree
RtlPcToFileHeader
RaiseException
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
MessageBoxW
advapi32
CryptDecrypt
LookupPrivilegeValueA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
GetUserNameW
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
ws2_32
WSASocketW
getaddrinfo
WSAStartup
WSARecv
getsockopt
freeaddrinfo
WSASetLastError
setsockopt
WSAGetLastError
recv
send
select
WSASend
closesocket
ioctlsocket
WSACleanup
connect
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertOpenStore
CertGetCertificateContextProperty
Exports
Exports
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 602KB - Virtual size: 602KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ