Skip to main content

ELK-BumbleBee - GOLD CABIN

Table of Contents

TL;DR
#

A phishing email delivered through the anonymous mail relay emkei.cz (114.29.236.247) reached CompliantSecure’s mail server MAIL01 at 2024-12-01 20:38:14. Twenty-three minutes later, user Administrator on IT01 downloaded NovaSecure_Audit_Findings.iso via Chrome webmail. After extracting the ISO with 7-Zip, the user executed Compliance_Reports.lnk, which launched BumbleBee loader 23.dll via rundll32.exe, establishing C2 to 3.68.97.124:443. The loader injected into ImagingDevices.exe at 21:09:27 (T1055), which beaconed a second C2 at 18.193.157.255:443. LSASS was dumped via procdump64.exe into C:\ProgramData\doc1.dmp. At 22:03, the attacker laterally moved to DC01 via PsExec using cracked markw credentials, dropped 1.7z containing AdFind and AnyDesk, created backdoor account sql_admin, performed network reconnaissance with a bat script, and RDP’d to FileServer01 (10.10.11.18). The attacker collected and archived share data, moved to Support01 using markw, downloaded Accounts_Updates_1524.csv, and finally executed patch.exe (Conti ransomware) across DC01 and FileServer01, dropping R3ADM3.txt ransom notes across all share directories.

Initial Access
#

Phishing Email
#

To identify the initial access vector I started by examining mail server logs on MAIL01.

Postfix log - emkei.cz connection

At 20:38:14, the log recorded Anonymous TLS connection established from emkei.cz[114.29.236.247] - emkei.cz is a anonymous email relay service frequently abused for phishing campaigns. I checked the domain on VirusTotal, where 12 out of 94 vendors flagged it as Malicious/Phishing.

emkei.cz VirusTotal result

ISO Delivery via Webmail
#

23 minutes after the phishing email arrived, I found a Sysmon Event ID 15 on host IT01 at 21:02:00.

Event ID 15 - ISO download

User Administrator downloaded NovaSecure_Audit_Findings.iso (SHA256: F445F806066028D621D8E6A6B949E59342C309DFEB1D517BD847F70069B1B8DD) through chrome.exe from the internal webmail. At 21:02:17, the user extracted the ISO using 7-Zip, which unpacked three files into C:\Users\Administrator\Downloads\NovaSecure_Audit_Findings: 23.dll, Compliance_Reports.lnk, and Critical_Findings_Summary.pdf.

7-Zip extraction - ISO contents

Execution
#

BumbleBee Loader
#

At 21:02:57 the Administrator double-clicked Compliance_Reports.lnk, which executed:

1"C:\Windows\System32\rundll32.exe" 23.dll, StartW

LNK execution - rundll32 launching 23.dll

This is the BumbleBee loader execution pattern - delivering a DLL inside an ISO and triggering it via an LNK file is the signature initial access technique associated with the GOLD CABIN threat group. The StartW export is BumbleBee’s standard entry point. Immediately at the same timestamp, Sysmon Event ID 3 confirmed rundll32.exe established an outbound TCP connection to 3.68.97.124:443.

C2 connection to 3.68.97.124

Post-Exploitation Discovery
#

Starting at 21:10:27, rundll32.exe spawned cmd.exe child processes for host and network enumeration.

Process Injection and C2 Persistence
#

Injection into ImagingDevices.exe
#

At 21:06:02, rundll32.exe (PID 4764) created C:\Program Files\Windows Photo Viewer\ImagingDevices.exe - a legitimate signed Windows binary selected to blend into normal process activity.

ImagingDevices.exe spawned by rundll32

At 21:09:27, Sysmon event id 8 confirmed code injection from rundll32.exe (PID 4764) into ImagingDevices.exe.

CreateRemoteThread into ImagingDevices.exe

The injected process subsequently established a second outbound HTTPS connection, from ImagingDevices.exe on IT01 to 18.193.157.255:443 - a second C2.

ImagingDevices.exe C2 to 18.193.157.255

Credential Dumping
#

At 21:15:03, cmd.exe executed:

1procdump64.exe -accepteula -ma lsass.exe C:\ProgramData\doc1.dmp

LSASS dump via procdump64

ProcDump is a legitimate Sysinternals diagnostic utility abused here to create a full memory dump of lsass.exe. The output file doc1.dmp was named to appear as a generic document. At 21:16:06, ImagingDevices.exe dropped C:\ProgramData\7zr.exe to the disk in preparation for compressing and staging the dump for exfiltration.

7zr.exe dropped by ImagingDevices.exe

Lateral Movement
#

Initial Access to DC01
#

With credentials obtained from the LSASS dump, the attacker authenticated to DC01 at 22:03.

markw elevated logon to DC01

PsExec Deployment
#

At 22:03:41 on DC01, the file C:\Windows\0453497.exe was created, followed immediately at 22:04:02 by registry entries under HKLM\System\CurrentControlSet\Services\0453497\ registering it as a Windows service, looks like PsExec lateral movement pattern where the tool copies a service binary to ADMIN$ and registers it remotely.

0453497.exe service registration

At 22:04:03,rundll32.exe was launched as NT AUTHORITY\SYSTEM with parent \\10.10.11.156\ADMIN$\0453497.exe, confirming PsExec execution originating from host 10.10.11.156.

rundll32.exe as SYSTEM via PsExec

Post-Exploitation on DC01
#

Tool Staging
#

At 22:06:58 and 22:07:10, C:\ProgramData\1.7z and C:\ProgramData\7zr.exe were created. The attcker extracted the archive, producing C:\ProgramData\AdFind.exe and C:\ProgramData\AnyDesk.exe. AdFind is a command-line Active Directory query tool used for domain reconnaissance. AnyDesk is a remote access application deployed here as a persistent backdoor channel independent of the compromised C2 implant.

1.7z and 7zr.exe drop

AdFind and AnyDesk extraction

Backdoor Account Creation
#

At 22:07:44 the attacker created a new local user and immediately elevated it:

1cmd.exe /C net user sql_admin P@ssw0rd! /add
2cmd.exe /C net localgroup Administrators sql_admin /ADD

sql_admin account creation

Network Reconnaissance
#

At 22:27:01, computers.txt and 1.bat were created on the sql_admin Desktop. At 22:27:11, 1.bat was executed, pinging four domain hosts by name: IT01.ad.compliantsecure.store, DC01.ad.compliantsecure.store, Support01.ad.compliantsecure.store, and FileServer01.ad.compliantsecure.store - confirming all four were reachable for further lateral movement.

Network reconnaissance bat script

RDP to FileServer01
#

At 22:30:17, C:\Users\sql_admin\Documents\Default.rdp was created, signaling RDP session preparation. At 22:30:26 - 22:31:32, Sysmon Event ID 3 confirmed mstsc.exe connecting from 10.10.11.156 to 10.10.11.18 on port 3389 under sql_admin.

Default.rdp creation

mstsc.exe RDP lateral movement

Collection and Exfiltration
#

At 22:36 and 22:51 on the file server, PowerShell accessed files across C:\Users\sql_admin\Desktop\Shares\ and its subdirectories Documents, Finance, Taxes, and HR. The presence of R3ADM3.txt in every directory indicated ransomware note deployment had already begun during collection.

File collection and ransom notes on FileServer01

The attacker archived the collected share data into Shares.7z and exfiltrated it.

Ransomware Deployment
#

At 22:41:21, patch.exe was created in C:\Shares\ on FileServer01. At 22:50:02, patch.exe was executed locally. And at 22:50:55, it was launched on DC01 via the network share path \\10.10.11.18\Shares\patch.exe.

patch.exe drop and timestomping on FileServer01

At 22:50:57, mass creation of R3ADM3.txt across C:\Users\Public\, C:\Users\Default\AppData\, and other directories confirmed patch.exe as Conti ransomware - the ransom note naming convention R3ADM3.txt is a known Conti indicator.

R3ADM3.txt ransom notes dropped

IOCs
#

TypeValueDescription
IP114.29.236.247phishing email source, emkei.cz relay
IP3.68.97.124BumbleBee C2 server, port 443
IP18.193.157.255secondary C2 via injected ImagingDevices.exe, port 443
IP10.10.11.110IT01 - initial compromised host
IP10.10.11.156PsExec lateral movement source
IP10.10.11.18FileServer01 - ransomware deployment target
Domainemkei.czanonymous phishing mail relay, 12/94 VT
HostIT01initial compromise, Administrator and markw
HostDC01lateral movement target via PsExec
HostFileServer01ransomware deployment and data exfiltration
HostSupport01lateral movement target via markw
FileC:\Users\Administrator\Downloads\NovaSecure_Audit_Findings.isoSHA256: F445F806066028D621D8E6A6B949E59342C309DFEB1D517BD847F70069B1B8DD - BumbleBee delivery ISO
File23.dllBumbleBee loader, executed via rundll32 StartW export
FileCompliance_Reports.lnkLNK trigger for BumbleBee execution
FileC:\ProgramData\doc1.dmpLSASS memory dump
FileC:\ProgramData\7zr.exe7-Zip console archiver, dropped by ImagingDevices.exe
FileC:\Windows\0453497.exePsExec service binary on DC01
FileC:\ProgramData\AdFind.exeAD reconnaissance tool
FileC:\ProgramData\AnyDesk.exepersistent remote access backdoor
FileC:\Shares\patch.exeConti ransomware payload
FileR3ADM3.txtConti ransom note, dropped across all share directories
RegistryHKLM\System\CurrentControlSet\Services\0453497\PsExec service registration on DC01
AccountAdministratorinitial compromised account on IT01
AccountmarkwAD account used for DC01 and Support01 lateral movement
Accountsql_adminbackdoor account created by attacker, password P@ssw0rd!

Attack Timeline
#

%%{init: {'theme': 'base', 'themeVariables': { 'background': '#ffffff', 'mainBkg': '#ffffff', 'primaryTextColor': '#000000', 'lineColor': '#333333', 'clusterBkg': '#ffffff', 'clusterBorder': '#333333'}}}%%
graph TD
    classDef default fill:#f9f9f9,stroke:#333,stroke-width:1px,color:#000;
    classDef access fill:#e1f5fe,stroke:#0277bd,stroke-width:2px,color:#000;
    classDef exec fill:#ffebee,stroke:#c62828,stroke-width:2px,color:#000;
    classDef inject fill:#fff3e0,stroke:#e65100,stroke-width:2px,color:#000;
    classDef cred fill:#f3e5f5,stroke:#6a1b9a,stroke-width:2px,color:#000;
    classDef lateral fill:#e8f5e9,stroke:#2e7d32,stroke-width:2px,color:#000;
    classDef exfil fill:#fce4ec,stroke:#880e4f,stroke-width:2px,color:#000;
    classDef ransom fill:#b71c1c,stroke:#7f0000,stroke-width:2px,color:#fff;

    A([emkei.cz - 114.29.236.247]):::default --> B[20:38:14 - Phishing email
delivered to MAIL01]:::access B --> C[21:02:00 - Administrator downloads
NovaSecure_Audit_Findings.iso via Chrome
IT01 - 10.10.11.110]:::access C --> D[21:02:17 - 7-Zip extracts ISO
23.dll + Compliance_Reports.lnk + PDF]:::exec D --> E[21:02:57 - LNK executes
rundll32.exe 23.dll StartW
C2 to 3.68.97.124:443]:::exec subgraph Inject [Injection and Credential Dumping - IT01] E --> F[21:06:02 - rundll32 spawns
ImagingDevices.exe]:::inject F --> G[21:09:27 - CreateRemoteThread
T1055 injection into ImagingDevices.exe]:::inject G --> H[21:10:27 - Discovery
ipconfig arp nbtstat]:::exec H --> I[21:15:03 - procdump64 dumps
lsass.exe to doc1.dmp]:::cred I --> J[22:29:04 - ImagingDevices.exe
C2 to 18.193.157.255:443]:::inject end subgraph DC [Lateral Movement to DC01] J --> K[22:03 - markw elevated logon
DC01 via NTLM v2 from IT01]:::lateral K --> L[22:04 - PsExec from 10.10.11.156
0453497.exe service - SYSTEM rundll32]:::lateral L --> M[22:07 - AdFind + AnyDesk staged
sql_admin backdoor account created]:::lateral M --> N[22:27 - 1.bat network recon
pings IT01 DC01 Support01 FileServer01]:::exec end subgraph FS [Lateral Movement to FileServer01 and Support01] N --> O[22:30 - RDP sql_admin
10.10.11.156 to 10.10.11.18]:::lateral O --> P[22:39:24 - markw logon to Support01
Accounts_Updates_1524.csv collected]:::lateral P --> Q[22:41 - patch.exe dropped to Shares
timestomped - FileServer01]:::exfil Q --> R[22:36-22:51 - share files collected
Shares.7z exfiltrated to attacker]:::exfil end subgraph Ransom [Ransomware Deployment] R --> S[22:50:02 - patch.exe executed
FileServer01 locally]:::ransom S --> T[22:50:55 - patch.exe via UNC path
\\10.10.11.18\Shares\patch.exe]:::ransom T --> U[22:50:57 - R3ADM3.txt dropped
Conti ransomware across all directories]:::ransom end