BumbleBee Roasts Its Way to Domain Admin
Tags
cmtmf-attack-pattern: Masquerading Process Injection
maec-delivery-vectors: Watering Hole
attack-pattern: Data Software Discovery - T1418 Credentials - T1589.001 Dns - T1071.004 Dns - T1590.002 Domain Account - T1087.002 Domain Account - T1136.002 Domain Accounts - T1078.002 Domain Groups - T1069.002 Domain Trust Discovery - T1482 Domains - T1583.001 Domains - T1584.001 File Deletion - T1070.004 File Deletion - T1630.002 Indicator Removal On Host - T1630 Ingress Tool Transfer - T1544 Ip Addresses - T1590.005 Kerberoasting - T1558.003 Lateral Tool Transfer - T1570 System Network Configuration Discovery - T1422 Lsass Memory - T1003.001 Malicious File - T1204.002 Malware - T1587.001 Malware - T1588.001 Mark-Of-The-Web Bypass - T1553.005 Masquerading - T1655 Process Discovery - T1424 Password Guessing - T1110.001 Phishing - T1660 Phishing - T1566 Powershell - T1059.001 Process Injection - T1631 Remote Access Software - T1663 Remote Desktop Protocol - T1021.001 Rundll32 - T1218.011 Server - T1583.004 Server - T1584.004 Smb/Windows Admin Shares - T1021.002 Software - T1592.002 Software Discovery - T1518 System Services - T1569 Windows Command Shell - T1059.003 Web Protocols - T1071.001 Web Protocols - T1437.001 Tool - T1588.002 Vulnerabilities - T1588.006 Connection Proxy - T1090 Credential Dumping - T1003 File Deletion - T1107 Indicator Removal On Host - T1070 Remote File Copy - T1105 Kerberoasting - T1208 Masquerading - T1036 New Service - T1050 Powershell - T1086 Process Discovery - T1057 Process Injection - T1055 Remote Access Tools - T1219 Remote Desktop Protocol - T1076 Remote Services - T1021 Remote System Discovery - T1018 Rundll32 - T1085 System Network Configuration Discovery - T1016 Windows Management Instrumentation - T1047 Valid Accounts - T1078 Indicator Removal On Host Masquerading Remote System Discovery Valid Accounts
Common Information
Type Value
UUID 440eb2a2-d3c0-445a-a947-bbf39950fbd7
Fingerprint c62224fda3a0b473
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 8, 2022, 1:36 a.m.
Added to db Sept. 11, 2022, 12:32 p.m.
Last updated Nov. 17, 2024, 10:40 p.m.
Headline BumbleBee Roasts Its Way to Domain Admin
Title BumbleBee Roasts Its Way to Domain Admin
Detected Hints/Tags/Attributes 180/3/143
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 249 The DFIR Report https://thedfirreport.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 20
1768.py
Details Domain 1
dofixifa.co
Details Domain 4
fuvataren.com
Details Domain 2
www.fuvataren.com
Details Domain 1
dofixifa.com
Details Domain 1
www.dofixifa.com
Details Domain 2
gmw.cn
Details Domain 7
anydesk.com
Details Domain 74
thedfirreport.com
Details Domain 64
go.microsoft.com
Details File 2
namr.dll
Details File 12
wab.exe
Details File 1260
explorer.exe
Details File 1018
rundll32.exe
Details File 69
comsvcs.dll
Details File 1
bc_invoice_report_corp_46.iso
Details File 409
c:\windows\system32\cmd.exe
Details File 1208
powershell.exe
Details File 17
1768.py
Details File 92
c:\windows\system32\svchost.exe
Details File 1122
svchost.exe
Details File 99
c:\windows\explorer.exe
Details File 1
c:\users\user\appdata\local\wab.exe
Details File 127
c:\windows\system32\rundll32.exe
Details File 2126
cmd.exe
Details File 27
c:\windows\system32\comsvcs.dll
Details File 1
c:\programdata\redacted\lsass.dmp
Details File 27
procdump.exe
Details File 26
procdump64.exe
Details File 2
c:\programdata\procdump64.exe
Details File 478
lsass.exe
Details File 4
c:\programdata\lsass.dmp
Details File 1
c:\programdata\redacted\ps.txt
Details File 7
s.bat
Details File 2
w.bat
Details File 8
servers.txt
Details File 1
serv.log
Details File 1
workers.txt
Details File 5
work.log
Details File 2
sharefinder.txt
Details File 6
seatbelt.exe
Details File 1
c:\programdata\seatinfo.txt
Details File 1
vulnrecon.dll
Details File 1
vulnrecon.exe
Details File 1
rs.js
Details File 15
%windir%\syswow64\rundll32.exe
Details File 13
%windir%\sysnative\rundll32.exe
Details File 21
%windir%\\syswow64\\rundll32.exe
Details File 21
%windir%\\sysnative\\rundll32.exe
Details File 1
bc_invoice_report_corp_46.zip
Details File 4
af.exe
Details File 3
commandline.dll
Details File 2
commands.sys
Details File 2
hostfxr.dll
Details File 1
api-ms-win-crt-runtime-l1-1-0.dll
Details File 1
api-ms-win-crt-convert-l1-1-0.dll
Details File 3
api-ms-win-crt-math-l1-1-0.dll
Details File 1
api-ms-win-crt-time-l1-1-0.dll
Details File 3
api-ms-win-crt-stdio-l1-1-0.dll
Details File 1
api-ms-win-crt-heap-l1-1-0.dll
Details File 1
api-ms-win-crt-string-l1-1-0.dll
Details File 1
api-ms-win-crt-locale-l1-1-0.dll
Details File 1
pfxvex450gd81.exe
Details md5 2
c424870876f1f2ef0dd36e7e569de906
Details md5 3
61be9ce3d068c08ff99a857f62352f9d
Details md5 26
a0e9f5d64349fb13191bc781f81f42e1
Details md5 14
ae4edc6faf64d08308082ad26be60767
Details md5 1
5226b7138f4dd1dbb9f6953bd75a320b
Details md5 1
3466ffaf086a29b8132e9e10d7111492
Details md5 1
f856d7e7d485a2fc5b38faddd8c6ee5c
Details md5 1
c68437cc9ed6645726119c12fdcb33e7
Details md5 3
9b02dd2a1a15e94922be3f85129083ac
Details md5 1
5839b4013cf6e25568f13d3fc4120795
Details md5 1
951d017ba31ecc6990c053225ee8f1e6
Details md5 1
3654f4e4c0858a9388c383b1225b8384
Details md5 1
bba3ff461eee305c7408e31e427f57e6
Details md5 1
4b78228c08538208686b0f55353fa3bf
Details sha1 1
6c87ca630c294773ab760d88587667f26e0213a3
Details sha1 1
58739dc62eeac7374db9a8c07df7c7c36b550ce5
Details sha1 1
c68e4d5eaae99d6f0a51eec48ace79a4fede3c09
Details sha1 1
7a3db4b3359b60786fcbdaf0115191502fcded07
Details sha1 3
2cb6ff75b38a3f24f3b60a2742b6f4d6027f0f2a
Details sha1 1
d9832b46dd6f249191e9cbcfba2222c1702c499a
Details sha1 1
a204f20b1c96c5b882949b93eb4ac20d4f9e4fdf
Details sha1 1
974ffbfae36e9a41ac672f9793ce1bee18f2e670
Details sha1 1
3300c0c05b33691ecc04133885b7fc9513174746
Details sha1 1
67707f863aa405a9b9a335704808c604845394bf
Details sha256 1
c1b8e9d77a6aea4fc7bed4a2a48515aa32a3922859c9091cecf1b5f381a87127
Details sha256 1
90f489452b4fe3f15d509732b8df8cc86d4486ece9aa10cbd8ad942f7880075e
Details sha256 2
2d67a6e6e7f95d3649d4740419f596981a149b500503cbc3fcbeb11684e55218
Details sha256 1
1cf28902be615c721596a249ca85f479984ad85dc4b19a7ba96147e307e06381
Details sha256 8
b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682
Details sha256 1
eb4cba90938df28f6d8524be639ed7bd572217f550ef753b2f2d39271faddaef
Details sha256 1
a9e90587c54e68761be468181e56a5ba88bac10968ff7d8c0a1c01537158fbe8
Details sha256 1
fa2b74bfc9359efba61ed7625d20f9afc11a7933ebc9653e8e9b1e44be39c455
Details sha256 1
59198ffaf74b0e931a1cafe78e20ebf0b16f3a5a03bb4121230a0c44d7b963d2
Details sha256 1
5eb0b0829b9fe344bff08de80f55a21a26a53df7bd230d777114d3e7b64abd24
Details IPv4 1
104.243.33.50
Details IPv4 1
108.62.12.174
Details IPv4 1441
127.0.0.1
Details IPv4 2
142.91.3.109
Details IPv4 2
45.140.146.30
Details IPv4 2
45.153.243.142
Details IPv4 1
108.177.235.25
Details MITRE ATT&CK Techniques 409
T1566
Details MITRE ATT&CK Techniques 365
T1204.002
Details MITRE ATT&CK Techniques 333
T1059.003
Details MITRE ATT&CK Techniques 460
T1059.001
Details MITRE ATT&CK Techniques 440
T1055
Details MITRE ATT&CK Techniques 297
T1070.004
Details MITRE ATT&CK Techniques 173
T1003.001
Details MITRE ATT&CK Techniques 36
T1558.003
Details MITRE ATT&CK Techniques 99
T1087.002
Details MITRE ATT&CK Techniques 124
T1482
Details MITRE ATT&CK Techniques 118
T1570
Details MITRE ATT&CK Techniques 160
T1021.001
Details MITRE ATT&CK Techniques 306
T1078
Details MITRE ATT&CK Techniques 141
T1219
Details MITRE ATT&CK Techniques 492
T1105
Details MITRE ATT&CK Techniques 442
T1071.001
Details MITRE ATT&CK Techniques 78
T1569
Details MITRE ATT&CK Techniques 139
T1021.002
Details MITRE ATT&CK Techniques 185
T1518
Details MITRE ATT&CK Techniques 245
T1016
Details MITRE ATT&CK Techniques 243
T1018
Details MITRE ATT&CK Techniques 433
T1057
Details MITRE ATT&CK Techniques 25
T1553.005
Details MITRE ATT&CK Techniques 348
T1036
Details MITRE ATT&CK Techniques 119
T1218.011
Details MITRE ATT&CK Techniques 74
T1069.002
Details MITRE ATT&CK Techniques 310
T1047
Details MITRE ATT&CK Techniques 44
T1110.001
Details Deprecated Microsoft Threat Actor Naming Taxonomy (Groups in development) 16
DEV-0193
Details Pdb 2
apphost.pdb
Details Pdb 1
vulnrecon.pdb
Details Threat Actor Identifier - FIN 42
FIN12
Details Url 1
http://104.243.33.50:80/a
Details Url 1
http://127.0.0.1:36177
Details Url 1
http://127.0.0.1:39303
Details Url 15
https://thedfirreport.com
Details Url 2
https://go.microsoft.com/fwlink/?linkid=798306
Details Yara rule 1
rule bumblebee_13387_VulnRecon_dll {
	meta:
		description = "BumbleBee - file VulnRecon.dll"
		author = "TheDFIRReport"
		reference = "https://thedfirreport.com"
		date = "2022-08-08"
		hash1 = "a9e90587c54e68761be468181e56a5ba88bac10968ff7d8c0a1c01537158fbe8"
	strings:
		$x1 = "Use VulnRecon.exe  -i, --SystemInfo  to execute this command" wide fullword
		$x2 = "Use VulnRecon.exe  -v, --Vulnerability  to execute this command" wide fullword
		$x3 = "Use VulnRecon.exe  -h, --HotFixes  to execute this command" wide fullword
		$x4 = "Use VulnRecon.exe -m, --MicrosoftUpdates to execute this command" wide fullword
		$x5 = "Use VulnRecon.exe   -s, --SupportedCve  to execute this command" wide fullword
		$s6 = "VulnRecon.dll" wide fullword
		$s7 = "VulnRecon.Commands.SystemCommands" ascii fullword
		$s8 = "VulnRecon.Commands.CveCommands" ascii fullword
		$s9 = "VulnRecon.Commands" ascii fullword
		$s10 = "VulnRecon.CommandLine" ascii fullword
		$s11 = "D:\\work\\rt\\VulnRecon\\VulnRecon\\obj\\Release\\net5.0\\VulnRecon.pdb" ascii fullword
		$s12 = "VulnRecon.Commands.ToolsCommand" ascii fullword
		$s13 = "Using VulnRecon.exe -o or VulnRecon.exe --OptionName" wide fullword
		$s14 = "commandVersion" ascii fullword
		$s15 = "GetSystemInfoCommand" ascii fullword
		$s16 = "CreateGetSupportedCveCommand" ascii fullword
		$s17 = "CreateWindowsVersionCommand" ascii fullword
		$s18 = "        <requestedExecutionLevel level=\"asInvoker\" uiAccess=\"false\"/>" ascii fullword
		$s19 = "get_CommandVersion" ascii fullword
		$s20 = "<CommandVersion>k__BackingField" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 50KB and 1 of ($x*) and 4 of them
}
Details Yara rule 1
rule bumblebee_13387_VulnRecon_exe {
	meta:
		description = "BumbleBee - file VulnRecon.exe"
		author = "TheDFIRReport"
		reference = "https://thedfirreport.com"
		date = "2022-08-08"
		hash1 = "eb4cba90938df28f6d8524be639ed7bd572217f550ef753b2f2d39271faddaef"
	strings:
		$s1 = "hostfxr.dll" wide fullword
		$s2 = "--- Invoked %s [version: %s, commit hash: %s] main = {" wide fullword
		$s3 = "This executable is not bound to a managed DLL to execute. The binding value is: '%s'" wide fullword
		$s4 = "D:\\a\\_work\\1\\s\\artifacts\\obj\\win-x64.Release\\corehost\\cli\\apphost\\standalone\\Release\\apphost.pdb" ascii fullword
		$s5 = "VulnRecon.dll" wide fullword
		$s6 = "api-ms-win-crt-runtime-l1-1-0.dll" ascii fullword
		$s7 = "  - %s&apphost_version=%s" wide fullword
		$s8 = "api-ms-win-crt-convert-l1-1-0.dll" ascii fullword
		$s9 = "api-ms-win-crt-math-l1-1-0.dll" ascii fullword
		$s10 = "api-ms-win-crt-time-l1-1-0.dll" ascii fullword
		$s11 = "api-ms-win-crt-stdio-l1-1-0.dll" ascii fullword
		$s12 = "api-ms-win-crt-heap-l1-1-0.dll" ascii fullword
		$s13 = "api-ms-win-crt-string-l1-1-0.dll" ascii fullword
		$s14 = "The managed DLL bound to this executable is: '%s'" wide fullword
		$s15 = "A fatal error was encountered. This executable was not bound to load a managed DLL." wide fullword
		$s16 = "api-ms-win-crt-locale-l1-1-0.dll" ascii fullword
		$s17 = "Showing error dialog for application: '%s' - error code: 0x%x - url: '%s'" wide fullword
		$s18 = "Failed to resolve full path of the current executable [%s]" wide fullword
		$s19 = "https://go.microsoft.com/fwlink/?linkid=798306" wide fullword
		$s20 = "The managed DLL bound to this executable could not be retrieved from the executable image." wide fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 400KB and all of them
}