Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
29-11-2024 12:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DKyVKmgVSvviRl.bat
Resource
win7-20241010-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DKyVKmgVSvviRl.bat
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
Behavioral task
behavioral3
Sample
aMLjTIhBvevLGx.dll
Resource
win7-20240903-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
aMLjTIhBvevLGx.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
150 seconds
Behavioral task
behavioral5
Sample
details.lnk
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Malware Config
Extracted
Family
bumblebee
Botnet
0411
C2
192.119.120.146:443
54.37.131.10:443
146.70.139.252:443
rc4.plain
Signatures
-
Bumblebee family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 33 1568 rundll32.exe 35 1568 rundll32.exe 38 1568 rundll32.exe 43 1568 rundll32.exe 44 1568 rundll32.exe 46 1568 rundll32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1568 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1568 1756 cmd.exe 84 PID 1756 wrote to memory of 1568 1756 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DKyVKmgVSvviRl.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\rundll32.exerundll32 aMLjTIhBvevLGx.dll,SendData2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:1568
-