Windows
Analysis Report
mount.dll
Overview
General Information
Detection
BumbleBee
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected BumbleBee
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contain functionality to detect virtual machines
Searches for specific processes (likely to inject)
C2 URLs / IPs found in malware configuration
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Contains long sleeps (>= 3 min)
AV process strings found (often used to terminate AV products)
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
loaddll64.exe (PID: 4084 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\mou nt.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA) cmd.exe (PID: 4812 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\mou nt.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F) rundll32.exe (PID: 640 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\moun t.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A) rundll32.exe (PID: 6016 cmdline:
rundll32.e xe C:\User s\user\Des ktop\mount .dll,shjKe AQfgT MD5: 73C519F050C20580F8A62C849D49215A) rundll32.exe (PID: 4112 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\moun t.dll",shj KeAQfgT MD5: 73C519F050C20580F8A62C849D49215A)
- cleanup
{"C2 url": ["282.19.133.12:443", "91.122.18.192:443", "185.156.172.62:443", "72.123.65.11:443", "149.255.35.167:443", "172.241.27.146:443"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security | ||
JoeSecurity_BumbleBee | Yara detected BumbleBee | Joe Security |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: |
Source: | Code function: | 3_2_0000021EF302F050 | |
Source: | Code function: | 3_2_0000021EF302F8B0 | |
Source: | Code function: | 3_2_0000021EF302F6B0 | |
Source: | Code function: | 3_2_0000021EF302FCB0 | |
Source: | Code function: | 3_2_0000021EF3144070 | |
Source: | Code function: | 3_2_0000021EF302E0B0 | |
Source: | Code function: | 3_2_0000021EF3030030 | |
Source: | Code function: | 3_2_0000021EF304DED0 | |
Source: | Code function: | 3_2_0000021EF3030380 | |
Source: | Code function: | 3_2_0000021EF302E300 | |
Source: | Code function: | 3_2_0000021EF3030790 | |
Source: | Code function: | 4_2_000001C33872E300 | |
Source: | Code function: | 4_2_000001C338730380 | |
Source: | Code function: | 4_2_000001C33872E660 | |
Source: | Code function: | 4_2_000001C338730700 | |
Source: | Code function: | 4_2_000001C338730790 | |
Source: | Code function: | 4_2_000001C33872FCB0 | |
Source: | Code function: | 4_2_000001C33874DED0 | |
Source: | Code function: | 4_2_000001C338730030 | |
Source: | Code function: | 4_2_000001C33872E0B0 | |
Source: | Code function: | 4_2_000001C338844070 | |
Source: | Code function: | 4_2_000001C33872F6B0 | |
Source: | Code function: | 4_2_000001C33872F8B0 | |
Source: | Code function: | 4_2_000001C338730A60 | |
Source: | Code function: | 4_2_000001C33872ED70 | |
Source: | Code function: | 4_2_000001C33872EE40 | |
Source: | Code function: | 4_2_000001C33872F050 |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Network Connect: | Jump to behavior |
Source: | URLs: | ||
Source: | URLs: |