{"id":2002,"date":"2024-09-25T10:31:33","date_gmt":"2024-09-25T10:31:33","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2002"},"modified":"2025-07-29T03:11:47","modified_gmt":"2025-07-29T03:11:47","slug":"analysis-of-new-wave-bumblebee-xlsm-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-new-wave-bumblebee-xlsm-campaign\/","title":{"rendered":"Analysis of New Wave Bumblebee XLSM Campaign"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"369\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-33.webp\" alt=\"\" class=\"wp-image-2005\"\/><\/figure>\n\n\n\n<p>Bumblebee malware is a relatively new type of malware downloader that has been linked to several cybercriminal groups. Previous waves of Bumblebee were delivered through ISO files that contain a malicious DLL and shortcut files (ISO, DLL and LNK files containing Bumblebee loader malware). Now they have moved to the Excel XLSM document to spread their malicious payload files.<\/p>\n\n\n\n<p>Target Platform: Windows<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Infection Chain<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"353\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-34.webp\" alt=\"\" class=\"wp-image-2003\"\/><\/figure>\n\n\n\n<p>Bumblebee infects its victims by initial infection vectors such as phishing and spam emails. These kind of emails contains Microsoft Office documents (Excel) or sometimes arrive in the form of password-protected archives.<\/p>\n\n\n\n<p>Phishing attacks have become the&nbsp;de-facto delivery method of choice for threat actors lately. The idea is straightforward: an attacker creates a dropper and attaches it to an email with a compelling message designed to trick the target into opening the file. Security awareness training on&nbsp;&#8220;how to detect and avoid&#8221;&nbsp;these attacks is encouraging threat actors to use more sophisticated methods to launch spear phishing attacks in the last 18 months. (Example: sending a document disguised as an invoice or a shipping attachment).<\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"234\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-33.webp\" alt=\"\" class=\"wp-image-2004\"\/><\/figure>\n\n\n\n<p>The initial attack vector may vary depending on the targets and we all know that savvy threat actors perform basic reconnaissance methodologies to decide their infection vector. Bumblebee loads from system memory and never touches the hard disk drive with the &#8220;fileless loading&#8221; flow, reducing the chances of being detected and stopped by traditional antivirus-like controls. Bumblebee has become a more potent initial access threat as its stealth quotient increases, as do its chances of enticing ransomware and malware operators looking for new ways to deploy their payloads.<\/p>\n\n\n\n<p><strong>Distributed via XLSM Spreadsheet<\/strong><\/p>\n\n\n\n<p>An .xlsm file is a macro-enabled spreadsheet, which is a widely used spreadsheet program that comes with every edition of the Microsoft Office suite. It contains worksheets of cells arranged by rows and columns as well as embedded macros programmed in the Visual Basic for Applications (VBA) language.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Technical Analysis of Bumblebee XLSM Campaign<\/h3>\n\n\n\n<p>Snap 1:&nbsp; Bumblebee Template<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"369\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-33.webp\" alt=\"\" class=\"wp-image-2005\"\/><\/figure>\n\n\n\n<p>Once the user receives an email from any unknown or known person, the content in the email body tempts the unsuspecting user to open it. Once a user opens the attachment, then the malware starts execution in-order to perform malicious actions. Also, if a connected network is present, it will use a list of common passwords, guessing its way onto other connected systems via brute-force attack.<\/p>\n\n\n\n<p>Snap 2: Auto_Close Document<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"428\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-33.webp\" alt=\"\" class=\"wp-image-2006\"\/><\/figure>\n\n\n\n<p>Snap 3: Runtime Error<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"470\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-32.webp\" alt=\"\" class=\"wp-image-2007\"\/><\/figure>\n\n\n\n<p>Snap 4: VBA Macro Content<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"657\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-32.webp\" alt=\"\" class=\"wp-image-2008\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-32.webp 1024w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-32-280x180.webp 280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Snap 5: Using API Calls to execute the DLL in the Special folder<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-31.webp\" alt=\"\" class=\"wp-image-2009\"\/><\/figure>\n\n\n\n<p>Get-Special folder specifications<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Constant<\/td><td class=\"has-text-align-center\" data-align=\"center\">Value<\/td><td>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Description<\/td><\/tr><tr><td>WindowsFolder<\/td><td class=\"has-text-align-center\" data-align=\"center\">0<\/td><td>The Windows folder contains files installed by the Windows operating system.<\/td><\/tr><tr><td>SystemFolder<\/td><td class=\"has-text-align-center\" data-align=\"center\">1<\/td><td>The System folder contains libraries, fonts, and device drivers.<\/td><\/tr><tr><td>TemporaryFolder<\/td><td class=\"has-text-align-center\" data-align=\"center\">2<\/td><td>The Temp folder is used to store temporary files. The path is found in TMP environment variable.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Snap 6: Dropped PE File<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"356\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-27.webp\" alt=\"\" class=\"wp-image-2010\"\/><\/figure>\n\n\n\n<p>Snap 7: DLL file properties<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"240\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-24.webp\" alt=\"\" class=\"wp-image-2011\"\/><\/figure>\n\n\n\n<p>Snap 8: Initial &#8211; Indicator of Compromise<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"165\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-23.webp\" alt=\"\" class=\"wp-image-2012\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Let\u2019s not forget our art of war lessons in the context of cyber security,<\/h3>\n\n\n\n<p>\u201cAll warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.\u201d<\/p>\n\n\n\n<p>-Sun Tzu, The Art of War<\/p>\n\n\n\n<p><strong>DisCONTInued, or Continued?<\/strong><\/p>\n\n\n\n<p>A lot of the bumblebee activity, seemed eerily similar to Conti\u2019s activity\u2026 Consider how Exotic LILY (threat actor) was linked to the Conti ransomware group.<\/p>\n\n\n\n<p>If you thought, Conti\u2019s group disintegrated and ceased to exist past May 2022\u2026 Think again!<\/p>\n\n\n\n<p>To clarify what we are stating and \u201cCONTInue\u201d malware infections, hear us out,<\/p>\n\n\n\n<p>First things first, Conti is implementing a new organizational structure with a network that is more horizontal and decentralised than the previous rigid Conti hierarchy.<\/p>\n\n\n\n<p>Secondly, this structure will be made up of several equal subdivisions, some of which will be independent and some of which will be part of another ransomware collective.<\/p>\n\n\n\n<p>Last but not the least; internal loyalty to each other within the network and the Conti leadership, particularly &#8220;reshaev,&#8221; will bind them all together as observed by the LMNTRIX CDC.<\/p>\n\n\n\n<p>Conti\u2019s new network possibly includes the following groups:<\/p>\n\n\n\n<p>TYPE I Threat Actors: Complete autonomy: There is no locker involved, just pure data theft such as Karakurt, BlackBasta, BlackByte malware.<\/p>\n\n\n\n<p>TYPE II Threat Actors: Semi-autonomous: Acting as Conti-loyal collective affiliates within other collectives to use their locker such as AlphV\/BlackCat, HIVE, HelloKitty\/FiveHands, and AvosLocker infections.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Indicators of Compromise for BumbleBee<\/h3>\n\n\n\n<p><strong>BumbleBee Files<\/strong><\/p>\n\n\n\n<p>container.vhd (SHA256) 91d29cfe549d8c7ade35f681ea60ce73a48e00c2f6d55a608f86b6f17f494d0d<br>Quote.lnk (SHA256) 940182dd2eaf42327457d249f781274b07e7978b62dca0ae4077b438a8e13937<br>quotefile.ps1 (SHA256) d6cc3ac995484b99ed790b6f8ceb145492794eb5d01ec4a71123b9975e9bfd20<br>stage2.ps1 (SHA256) 5d000af554dcd96efa066301b234265892b8bf37bf134f21184096bdc3d7230b<br>payload.dll (SHA256) 0b0a5f3592df7b538b8d8db4ba621b03896f27c9f112b88d56761972b03e6e58<\/p>\n\n\n\n<p><strong>Bumblebee ISO samples<\/strong><\/p>\n\n\n\n<p>9eacade8174f008c48ea57d43068dbce3d91093603db0511467c18252f60de32<br>6214e19836c0c3c4bc94e23d6391c45ad87fdd890f6cbd3ab078650455c31dc8<br>201c4d0070552d9dc06b76ee55479fc0a9dfacb6dbec6bbec5265e04644eebc9<br>1fd5326034792c0f0fb00be77629a10ac9162b2f473f96072397a5d639da45dd<br>01cc151149b5bf974449b00de08ce7dbf5eca77f55edd00982a959e48d017225<\/p>\n\n\n\n<p><strong>Bumblebee Samples Analyzed<\/strong><\/p>\n\n\n\n<p>c70413851599bbcd9df3ce34cc356b66d10a5cbb2da97b488c1b68894c60ea69<br>c78290da99475f965ce54f737e0927a9855e03c9a27f2ee7a797562533779305<br>14f04302df7fa49d138c876705303d6991083fd84c59e8a618d6933d50905c61<br>76e4742d9e7f4fd3a74a98c006dfdce23c2f9434e48809d62772acff169c3549<br>024f8b16ee749c7bb0d76500ab22aa1418cd8256fb12dcbf18ab248acf45947e<br>2691858396d4993749fec76ac34cf3cc3658ee3d4eaf9c748e2782cfc994849d<br>6bc2ab410376c1587717b2293f2f3ce47cb341f4c527a729da28ce00adaaa8db<br>083a4678c635f5d14ac5b6d15675d2b39f947bb9253be34d0ab0db18d3140f96<br>21df56d1d4b0a6a54bae3aba7fe15d307bac0e3391625cef9b05dd749cf78c0c<br>31005979dc726ed1ebfe05558f00c841912ca950dccdcdf73fd2ffbae1f2b97f<br>2d67a6e6e7f95d3649d4740419f596981a149b500503cbc3fcbeb11684e55218<br>f98898df74fb2b2fad3a2ea2907086397b36ae496ef3f4454bf6b7125fc103b8<br>3c0f67f71e427b24dc77b3dee60b08bfb19012634465115e1a2e7ee5bef16015<br>ca9da17b4b24bb5b24cc4274cc7040525092dffdaa5922f4a381e5e21ebf33aa<br>82aab01a3776e83695437f63dacda88a7e382af65af4af1306b5dbddbf34f9eb<br>a5bcb48c0d29fbe956236107b074e66ffc61900bc5abfb127087bb1f4928615c<br>07f277c527d707c6138aae2742939e8edc9f700e68c4f50fd3d17fe799641ea8<br>68ac44d1a9d77c25a97d2c443435459d757136f0d447bfe79027f7ef23a89fce<br>13c573cad2740d61e676440657b09033a5bec1e96aa1f404eed62ba819858d78<br>7024ec02c9670d02462764dcf99b9a66b29907eae5462edb7ae974fe2efeebad<br>ee27cceac88199bf3546e8b187d77509519d6782a0e114fc9cfc11faa2d33cd1<br>b2c28cdc4468f65e6fe2f5ef3691fa682057ed51c4347ad6b9672a9e19b5565e<\/p>\n\n\n\n<p><strong>BumbleBee Domains<\/strong><\/p>\n\n\n\n<p>al-ghurair[.]us<br>amevida[.]us<br>awsblopharma[.]com<br>avrobio[.]co<br>brightlnsight[.]co<br>belcolnd[.]com<br>craneveyor[.]us<br>conlfex[.]com<br>elemblo[.]com<br>faustel[.]us<br>kvnational[.]us<br>lagauge[.]us<br>lsoplexis[.]com<br>modernmeadow[.]co<br>missionbio[.]us<br>opontia[.]us<br>prmflltration[.]com<br>phxmfg[.]co<br>richllndmetals[.]com<br>revergy[.]us<\/p>\n\n\n\n<p>Here are some common <strong>C2 Server<\/strong> IP addresses we have been tracking,<\/p>\n\n\n\n<p>104[.]168[.]201[.]219 142[.]11[.]234[.]230 145[.]239[.]30[.]26<br>145[.]239[.]135[.]155 145[.]239[.]28[.]110 146[.]19[.]173[.]202<br>146[.]70[.]125[.]122 152[.]89[.]247[.]79 185[.]17[.]40[.]189<br>185[.]62[.]58[.]175 205[.]185[.]122[.]143 205[.]185[.]123[.]137<br>209[.]141[.]46[.]50 209[.]141[.]58[.]141 51[.]210[.]158[.]156<br>51[.]68[.]144[.]94 51[.]68[.]145[.]54 51[.]68[.]146[.]186<br>51[.]68[.]147[.]233 51[.]75[.]62[.]99 51[.]83[.]250[.]240<br>51[.]83[.]251[.]245 51[.]83[.]253[.]131 51[.]83[.]253[.]244<br>54[.]37[.]130[.]166 54[.]37[.]131[.]14 54[.]38[.]136[.]111<br>54[.]38[.]136[.]187 54[.]38[.]138[.]94 54[.]38[.]139[.]20<\/p>\n\n\n\n<p>Note: The number of BumbleBee C2 servers in the wild, continue to increase by the day.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Tactics &amp; Techniques for Bumblebee XLSM variant<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Tactic<\/strong>s<\/td><td><strong>Technique<\/strong><\/td><\/tr><tr><td>TA0001<\/td><td>Initial Access<\/td><td>Spear phishing Attachment<br>Spear phishing Link<\/td><\/tr><tr><td>TA0002<\/td><td>&nbsp; Execution<\/td><td>Obfuscated Files or Information<br>Visual Basic \/ Malicious File<\/td><\/tr><tr><td>TA0003<\/td><td>&nbsp;&nbsp;Persistence<\/td><td>Scheduled Task<br>Registry Run Keys \/ Startup Folder<\/td><\/tr><tr><td>TA0004<\/td><td>Privilege Escalation<\/td><td>Sets debug register (to hijack the execution of another thread). Creates a process in suspended mode (likely to inject code). Spawn\u2019s processes.<\/td><\/tr><tr><td>TA0005<\/td><td>&nbsp; Defense Evasion<\/td><td>May sleep (evasive loops) hinder dynamic analysis. Checks if the current process is being debugged.<\/td><\/tr><tr><td>TA0006<\/td><td>Credential Access<\/td><td>OS Credential Dumping.<br>Password Guessing.<br>Credentials from Web Browsers.<\/td><\/tr><tr><td>TA0007<\/td><td>Discovery<\/td><td>Reads the host\u2019s file. System Information Discovery. Reads software policies. Queries the volume information (name, serial number etc) of a device. Virtualization\/Sandbox Evasion.<\/td><\/tr><tr><td>TA0011<\/td><td>C&amp;C Server<\/td><td>Application Layer Protocol &#8211; Uses HTTPS. Non-Standard Port &#8211; Detected TCP or UDP traffic on non-standard ports. Encrypted Channel &#8211; Uses HTTPS for network communication, use the SSL MITM Proxy cookbook for further analysis.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Bumblebee malware is a relatively new type of malware downloader that has been linked to several cybercriminal groups. Previous waves of Bumblebee were delivered through ISO files that contain a malicious DLL and shortcut files (ISO, DLL and LNK files containing Bumblebee loader malware). Now they have moved to the Excel XLSM document to spread [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2005,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2002"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions"}],"predecessor-version":[{"id":4177,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions\/4177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2005"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}