Analysis
-
max time kernel
12s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe
Resource
win7-20220414-en
General
-
Target
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe
-
Size
447KB
-
MD5
e85af8c3447525f61e1f6c04e6bef2b4
-
SHA1
18c53278eeff39b7cb8b491a9f83c8805d06f78e
-
SHA256
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211
-
SHA512
7c380b2b49ff1d132976cb17fcfb45c21cef1c2bbc004d996e0bbd08316230e898e3112895a7c96d4a212a832dcd288cf1d54c120c8e7c6bacaff2872d3efdec
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tmp8300.tmp.exepid process 3604 tmp8300.tmp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exedescription pid process target process PID 1964 wrote to memory of 3604 1964 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp8300.tmp.exe PID 1964 wrote to memory of 3604 1964 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp8300.tmp.exe PID 1964 wrote to memory of 3604 1964 35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe tmp8300.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe"C:\Users\Admin\AppData\Local\Temp\35cc13b7eb863c2affc3a0f4ace204049f587291607ee56eea46d306eebc6211.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\tmp8300.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8300.tmp.exe"2⤵
- Executes dropped EXE
PID:3604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06