Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-05-2022 21:30
Static task
static1
Behavioral task
behavioral1
Sample
1400621884.exe
Resource
win7-20220414-en
General
-
Target
1400621884.exe
-
Size
87KB
-
MD5
cab62deb76880ed5c49abfefa6f7862c
-
SHA1
c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
-
SHA256
45fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
-
SHA512
57c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Colibri Loader Activity
suricata: ET MALWARE Win32/Colibri Loader Activity
-
suricata: ET MALWARE Win32/Colibri Loader Activity M2
suricata: ET MALWARE Win32/Colibri Loader Activity M2
-
suricata: ET MALWARE Win32/Colibri Loader Activity M3
suricata: ET MALWARE Win32/Colibri Loader Activity M3
-
Executes dropped EXE 3 IoCs
Processes:
dllhost.exedllhost.exedllhost.exepid process 2024 dllhost.exe 672 dllhost.exe 1668 dllhost.exe -
Loads dropped DLL 1 IoCs
Processes:
1400621884.exepid process 1836 1400621884.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
1400621884.exetaskeng.exedescription pid process target process PID 1836 wrote to memory of 2028 1836 1400621884.exe schtasks.exe PID 1836 wrote to memory of 2028 1836 1400621884.exe schtasks.exe PID 1836 wrote to memory of 2028 1836 1400621884.exe schtasks.exe PID 1836 wrote to memory of 2028 1836 1400621884.exe schtasks.exe PID 1836 wrote to memory of 2024 1836 1400621884.exe dllhost.exe PID 1836 wrote to memory of 2024 1836 1400621884.exe dllhost.exe PID 1836 wrote to memory of 2024 1836 1400621884.exe dllhost.exe PID 1836 wrote to memory of 2024 1836 1400621884.exe dllhost.exe PID 1504 wrote to memory of 672 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 672 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 672 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 672 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 1668 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 1668 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 1668 1504 taskeng.exe dllhost.exe PID 1504 wrote to memory of 1668 1504 taskeng.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1400621884.exe"C:\Users\Admin\AppData\Local\Temp\1400621884.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\schtasks.exe/create /tn COMSurrogate /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"2⤵
- Creates scheduled task(s)
PID:2028
-
-
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"2⤵
- Executes dropped EXE
PID:2024
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2831BFA7-B95D-4495-A4A0-1E3F3E019BFB} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exeC:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe2⤵
- Executes dropped EXE
PID:672
-
-
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exeC:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe2⤵
- Executes dropped EXE
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06