Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
7aa5af5ee7a10b31309807e9f72ef711cbf2864c17d943ded85ca439b6106ea4.dll
Resource
win7-20240903-en
General
-
Target
7aa5af5ee7a10b31309807e9f72ef711cbf2864c17d943ded85ca439b6106ea4.dll
-
Size
1.4MB
-
MD5
bfae0c9a0e0f0dd88051aaa8eb2faedf
-
SHA1
40fde1f9090fce8ef1c27865ff44d33e47fa9c74
-
SHA256
7aa5af5ee7a10b31309807e9f72ef711cbf2864c17d943ded85ca439b6106ea4
-
SHA512
df846c0ab7cffc8d65edff807c095b785220b1cfd6244940744222c0b5cf05c4be6248cc172165fbe7c00f0b72dbf6be587fb762fdd9779ba022f0639a62f5dc
-
SSDEEP
24576:yF8n2LaxtDT0rYOA+nB64XaTL7AXC6r/rHZwNkirBTCGCo:yF8vT2YD+s4XaTL7U/H2NrRfCo
Malware Config
Extracted
bumblebee
306f
209.141.46.50:443
146.19.173.155:443
27.183.95.15:443
54.38.138.94:443
Signatures
-
Bumblebee family
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2632 regsvr32.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe 2632 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7aa5af5ee7a10b31309807e9f72ef711cbf2864c17d943ded85ca439b6106ea4.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:2632