Resubmissions
23-10-2021 13:49
211023-q4pj3acda6 927-09-2021 16:25
210927-tw86aahecn 1027-09-2021 16:15
210927-tp7c4shebk 1025-09-2021 21:37
210925-1glj1adhh7 924-09-2021 00:57
210924-bbd6asfdgj 1024-09-2021 00:56
210924-bad4xafdfr 924-09-2021 00:43
210924-a2zz1sfdh6 10Analysis
-
max time kernel
79s -
max time network
27s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 16:25
Static task
static1
Behavioral task
behavioral1
Sample
APP.exe
Resource
win10-en-20210920
General
-
Target
APP.exe
-
Size
5MB
-
MD5
a0b4d2c96937104bcffd21ce69885a59
-
SHA1
6cda6e2bee6d67a5f407e4d7e96af9d76bfa7c79
-
SHA256
72cb50e5791e1fcb11d24bc4cff3b44379a529c5549fbf6f500adcd67bfe9139
-
SHA512
17b1b4de1bddb7f357744ace07509481e80eb8a63fa9c39ee00ecd7eba3b03611eb0e2329e88e20b05e8a2655fa67a7b699c8455c1fa9aebeba4384151ae2ee0
Malware Config
Extracted
C:\Users\Admin\HOW_TO_RECOVER_FILES.Colossus.txt
colossussupport@protonmail.com
http://colossus.support/LPc6EwBqmyC8Tv9Glawleycars/
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
APP.exeAPP.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion APP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion APP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion APP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion APP.exe -
Processes:
resource yara_rule behavioral1/memory/3800-115-0x0000000000CF0000-0x00000000019CB000-memory.dmp themida behavioral1/memory/4428-118-0x0000000000CF0000-0x00000000019CB000-memory.dmp themida -
Processes:
APP.exeAPP.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA APP.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA APP.exe -
Processes:
yara_rule Colossus_Note behavioral1/files/0x000600000000ff38-120.dat Colossus_Note -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4512 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 1540 wrote to memory of 4428 1540 cmd.exe APP.exe PID 1540 wrote to memory of 4428 1540 cmd.exe APP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\APP.exe"C:\Users\Admin\AppData\Local\Temp\APP.exe"
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\APP.exe.\APP.exe 6e42f05c8e4d24c3fa0ce2f2a8d203c8 C:\Users\Admin
- Checks BIOS information in registry
- Checks whether UAC is enabled
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\HOW_TO_RECOVER_FILES.Colossus.txt
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
C:\Users\Admin\HOW_TO_RECOVER_FILES.Colossus.txtMD5
898d5f963f127e7f0daeebd42801e511
SHA1b516caca91cfdd6c13b385c2a65db5244bf9ebbb
SHA256f07ae15d589c80022346018f554c599142169edf0b401aee471de9224b676e03
SHA512e323d278c71db2c2e5d66de37afcb730caf621db51937456543cdb6028c09b7e827ef6e9c9b35607f9abde3af3f49896f182aebba87c70538f774bfd67dc82df
-
memory/3800-115-0x0000000000CF0000-0x00000000019CB000-memory.dmpFilesize
12MB
-
memory/3800-116-0x0000000000CF1000-0x0000000000DD7000-memory.dmpFilesize
920KB
-
memory/4428-117-0x0000000000000000-mapping.dmp
-
memory/4428-118-0x0000000000CF0000-0x00000000019CB000-memory.dmpFilesize
12MB