Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe
Resource
win7-20220414-en
General
-
Target
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe
-
Size
447KB
-
MD5
e85af8c3447525f61e1f6c04e6bef2b4
-
SHA1
18c53278eeff39b7cb8b491a9f83c8805d06f78e
-
SHA256
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211
-
SHA512
7c380b2b49ff1d132976cb17fcfb45c21cef1c2bbc004d996e0bbd08316230e898e3112895a7c96d4a212a832dcd288cf1d54c120c8e7c6bacaff2872d3efdec
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Colibri Loader Activity
suricata: ET MALWARE Win32/Colibri Loader Activity
-
suricata: ET MALWARE Win32/Colibri Loader Activity M2
suricata: ET MALWARE Win32/Colibri Loader Activity M2
-
suricata: ET MALWARE Win32/Colibri Loader Activity M3
suricata: ET MALWARE Win32/Colibri Loader Activity M3
-
Executes dropped EXE 4 IoCs
Processes:
tmp94A2.tmp.exedllhost.exedllhost.exedllhost.exepid process 1984 tmp94A2.tmp.exe 620 dllhost.exe 2012 dllhost.exe 1592 dllhost.exe -
Loads dropped DLL 1 IoCs
Processes:
tmp94A2.tmp.exepid process 1984 tmp94A2.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exetmp94A2.tmp.exetaskeng.exedescription pid process target process PID 1944 wrote to memory of 1984 1944 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp94A2.tmp.exe PID 1944 wrote to memory of 1984 1944 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp94A2.tmp.exe PID 1944 wrote to memory of 1984 1944 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp94A2.tmp.exe PID 1944 wrote to memory of 1984 1944 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp94A2.tmp.exe PID 1984 wrote to memory of 364 1984 tmp94A2.tmp.exe schtasks.exe PID 1984 wrote to memory of 364 1984 tmp94A2.tmp.exe schtasks.exe PID 1984 wrote to memory of 364 1984 tmp94A2.tmp.exe schtasks.exe PID 1984 wrote to memory of 364 1984 tmp94A2.tmp.exe schtasks.exe PID 1984 wrote to memory of 620 1984 tmp94A2.tmp.exe dllhost.exe PID 1984 wrote to memory of 620 1984 tmp94A2.tmp.exe dllhost.exe PID 1984 wrote to memory of 620 1984 tmp94A2.tmp.exe dllhost.exe PID 1984 wrote to memory of 620 1984 tmp94A2.tmp.exe dllhost.exe PID 1732 wrote to memory of 2012 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 2012 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 2012 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 2012 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 1592 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 1592 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 1592 1732 taskeng.exe dllhost.exe PID 1732 wrote to memory of 1592 1732 taskeng.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe"C:\Users\Admin\AppData\Local\Temp\35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tmp94A2.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp94A2.tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exe/create /tn COMSurrogate /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"3⤵
- Creates scheduled task(s)
PID:364
-
-
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"3⤵
- Executes dropped EXE
PID:620
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E4AACF8-B3CD-4B50-B405-ACAC3DA9D60A} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exeC:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe2⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exeC:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe2⤵
- Executes dropped EXE
PID:1592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06