ProcessLoad
Behavioral task
behavioral1
Sample
4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61.dll
Resource
win10v2004-20240226-en
General
-
Target
4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61
-
Size
2.2MB
-
MD5
3f34d94803e9c8bc0a9cd09f507bc515
-
SHA1
be9e16933821f27477f3616b5fc7dc21cf136ad9
-
SHA256
4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61
-
SHA512
11067c9cfa3eddd399cc38bb039c597534f0191804aae013265a5c438217571d736ef8c38a53853a9be5b5560a5ecc98bd4e5b51a33eca1179e66902bd01608a
-
SSDEEP
49152:dmxV8r49vGU/vrw/duhM6DRCQstcYIMkqPGyoWY:6zM6EQsGLMk1y1
Malware Config
Extracted
bumblebee
VPS1GROUP
23.82.19.208:443
Signatures
-
Bumblebee family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61
Files
-
4063fab9176db3960fa6014173b6c7ba52f19424887f5a6205ff73aa447ada61.dll windows:6 windows x64 arch:x64
bc1fc12dfcfbfb96d61fc1ad211049f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
TlsAlloc
QueueUserAPC
CreateWaitableTimerA
DeleteCriticalSection
VerSetConditionMask
SleepEx
TlsGetValue
GetSystemTimeAsFileTime
TlsFree
CreateIoCompletionPort
FileTimeToSystemTime
LoadLibraryW
GetLocalTime
GetProcAddress
SystemTimeToFileTime
GetModuleHandleW
GetCurrentProcess
Thread32Next
Thread32First
GetModuleHandleA
OpenProcess
LoadLibraryA
VirtualProtectEx
OpenThread
GetStdHandle
GetFileType
WriteFile
MultiByteToWideChar
SwitchToFiber
DeleteFiber
CreateFiber
WideCharToMultiByte
ConvertFiberToThread
ConvertThreadToFiber
QueryPerformanceCounter
GetTickCount
GlobalMemoryStatus
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
GetSystemTime
ReadFile
GetModuleFileNameW
SetFilePointer
lstrlenA
CreateFileW
lstrcmpA
TerminateThread
VirtualAlloc
HeapFree
CreateFileA
HeapReAlloc
HeapAlloc
GetFileSize
GetProcessHeap
VirtualQuery
lstrcpyA
GetFullPathNameW
GetCurrentDirectoryW
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
SetEvent
CreateEventW
PostQueuedCompletionStatus
GetQueuedCompletionStatus
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForMultipleObjects
EnterCriticalSection
SetLastError
VerifyVersionInfoA
TlsSetValue
SetWaitableTimer
GetCurrentProcessId
ExitProcess
GetLastError
GetModuleHandleExA
Sleep
lstrcatA
GetModuleFileNameA
GetDriveTypeW
FindFirstFileW
SetEndOfFile
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
OutputDebugStringW
SetStdHandle
SetFilePointerEx
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
WriteConsoleW
SetConsoleCtrlHandler
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
FreeLibrary
CreateDirectoryA
GetFileAttributesA
CloseHandle
CreateToolhelp32Snapshot
WaitForSingleObject
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InterlockedFlushSList
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
FormatMessageA
LocalFree
user32
GetUserObjectInformationW
GetProcessWindowStation
wsprintfW
MessageBoxW
advapi32
CryptDecrypt
LookupPrivilegeValueA
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
GetUserNameW
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
ws2_32
WSASocketW
getaddrinfo
connect
WSARecv
getsockopt
freeaddrinfo
WSASetLastError
setsockopt
WSAGetLastError
recv
send
select
WSASend
closesocket
ioctlsocket
WSACleanup
WSAStartup
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertFreeCertificateContext
CertOpenStore
CertGetCertificateContextProperty
shlwapi
StrChrA
StrToIntA
Exports
Exports
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640KB - Virtual size: 640KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ