Analysis
-
max time kernel
73s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
bb.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bb.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
run.bat
Resource
win7-20240903-en
General
-
Target
bb.dll
-
Size
2.0MB
-
MD5
5dc6a6789108ac4e667ce24142da1d35
-
SHA1
660db375094ffef61406b9867528a96861b323e0
-
SHA256
487dfd12574da32277b18f9ccf3f4143bf676e3560cec909d44db957b1b37670
-
SHA512
b50af80effc8724690c63ce97798792129994e6fba95d7528ebb43aeaa4996938e4cf781135b0340c6b970f36eb3e53c186abf442494bf5b02478a39fe3125a7
-
SSDEEP
49152:7WUC0sDBCKCyRf0C3yXGrlz7WHdUcZOiND:7W0sDBCKCyRf0C3y+cZv
Malware Config
Extracted
bumblebee
276a
146.70.106.52:443
65.72.191.77:443
103.175.16.116:443
185.62.58.175:443
209.141.58.141:443
154.56.0.112:443
Signatures
-
Bumblebee family
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\SOFTWARE\Wine regsvr32.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bb.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:1736