Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
29-11-2024 12:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DKyVKmgVSvviRl.bat
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DKyVKmgVSvviRl.bat
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
Behavioral task
behavioral3
Sample
aMLjTIhBvevLGx.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
aMLjTIhBvevLGx.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
150 seconds
Behavioral task
behavioral5
Sample
details.lnk
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Malware Config
Extracted
Family
bumblebee
Botnet
0411
C2
192.119.120.146:443
54.37.131.10:443
146.70.139.252:443
rc4.plain
Signatures
-
Bumblebee family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 34 4356 rundll32.exe 35 4356 rundll32.exe 38 4356 rundll32.exe 46 4356 rundll32.exe 47 4356 rundll32.exe 49 4356 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4356 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4356 2680 cmd.exe 84 PID 2680 wrote to memory of 4356 2680 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DKyVKmgVSvviRl.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\rundll32.exerundll32 aMLjTIhBvevLGx.dll,SendData2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4356
-