Analysis
-
max time kernel
556s -
max time network
570s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
02-12-2024 11:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DKyVKmgVSvviRl.bat
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DKyVKmgVSvviRl.bat
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
Behavioral task
behavioral3
Sample
aMLjTIhBvevLGx.dll
Resource
win7-20241023-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
aMLjTIhBvevLGx.dll
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
150 seconds
Behavioral task
behavioral5
Sample
details.lnk
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Malware Config
Extracted
Family
bumblebee
Botnet
0411
C2
192.119.120.146:443
54.37.131.10:443
146.70.139.252:443
rc4.plain
Signatures
-
Bumblebee family
-
Blocklisted process makes network request 29 IoCs
flow pid Process 31 2360 rundll32.exe 39 2360 rundll32.exe 54 2360 rundll32.exe 58 2360 rundll32.exe 62 2360 rundll32.exe 68 2360 rundll32.exe 72 2360 rundll32.exe 75 2360 rundll32.exe 76 2360 rundll32.exe 78 2360 rundll32.exe 79 2360 rundll32.exe 81 2360 rundll32.exe 83 2360 rundll32.exe 84 2360 rundll32.exe 86 2360 rundll32.exe 90 2360 rundll32.exe 95 2360 rundll32.exe 97 2360 rundll32.exe 98 2360 rundll32.exe 100 2360 rundll32.exe 105 2360 rundll32.exe 107 2360 rundll32.exe 111 2360 rundll32.exe 114 2360 rundll32.exe 116 2360 rundll32.exe 117 2360 rundll32.exe 119 2360 rundll32.exe 120 2360 rundll32.exe 121 2360 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation cmd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2360 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 820 wrote to memory of 2928 820 cmd.exe 83 PID 820 wrote to memory of 2928 820 cmd.exe 83 PID 2928 wrote to memory of 2360 2928 cmd.exe 84 PID 2928 wrote to memory of 2360 2928 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\details.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c DKyVKmgVSvviRl.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\rundll32.exerundll32 aMLjTIhBvevLGx.dll,SendData3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2360
-
-