Analysis
-
max time kernel
62s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe
Resource
win7-20220414-en
General
-
Target
792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe
-
Size
425KB
-
MD5
9e7322df010fcaf39555b79849014ff2
-
SHA1
aa5f2d73b5dd6c0e6207b5cbb1b5d8dadff31008
-
SHA256
792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f
-
SHA512
97455f588328c467523c676449716e480e8638015bab280d194104da44a563d528645f7175b0a3f81d9c4cb62d7560893b143a70361a5ef3418e9bcd2e17f9a5
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
suricata: ET MALWARE Generic gate .php GET with minimal headers
suricata: ET MALWARE Generic gate .php GET with minimal headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Colibri Loader Activity
suricata: ET MALWARE Win32/Colibri Loader Activity
-
suricata: ET MALWARE Win32/Colibri Loader Activity M2
suricata: ET MALWARE Win32/Colibri Loader Activity M2
-
suricata: ET MALWARE Win32/Colibri Loader Activity M3
suricata: ET MALWARE Win32/Colibri Loader Activity M3
-
Executes dropped EXE 2 IoCs
Processes:
tmp1DED.tmp.exedllhost.exepid process 1268 tmp1DED.tmp.exe 1612 dllhost.exe -
Loads dropped DLL 1 IoCs
Processes:
tmp1DED.tmp.exepid process 1268 tmp1DED.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exetmp1DED.tmp.exedescription pid process target process PID 1836 wrote to memory of 1268 1836 792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe tmp1DED.tmp.exe PID 1836 wrote to memory of 1268 1836 792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe tmp1DED.tmp.exe PID 1836 wrote to memory of 1268 1836 792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe tmp1DED.tmp.exe PID 1836 wrote to memory of 1268 1836 792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe tmp1DED.tmp.exe PID 1268 wrote to memory of 988 1268 tmp1DED.tmp.exe schtasks.exe PID 1268 wrote to memory of 988 1268 tmp1DED.tmp.exe schtasks.exe PID 1268 wrote to memory of 988 1268 tmp1DED.tmp.exe schtasks.exe PID 1268 wrote to memory of 988 1268 tmp1DED.tmp.exe schtasks.exe PID 1268 wrote to memory of 1612 1268 tmp1DED.tmp.exe dllhost.exe PID 1268 wrote to memory of 1612 1268 tmp1DED.tmp.exe dllhost.exe PID 1268 wrote to memory of 1612 1268 tmp1DED.tmp.exe dllhost.exe PID 1268 wrote to memory of 1612 1268 tmp1DED.tmp.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe"C:\Users\Admin\AppData\Local\Temp\792536cb7e72e25a03d2b9b2d54027106eb2003ab56f7104cd407f57693cfc2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\tmp1DED.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1DED.tmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\schtasks.exe/create /tn COMSurrogate /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"3⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"C:\Users\Admin\Documents\WindowsPowerShell\dllhost.exe"3⤵
- Executes dropped EXE
PID:1612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06
-
Filesize
87KB
MD5cab62deb76880ed5c49abfefa6f7862c
SHA1c8b358844131c983dd96b1ca74ea1b8d5d34c6a8
SHA25645fff4489cc037313de8edf3589515197c184579658921fb06eb6fd4e860253e
SHA51257c4ef898513b8c9c4e14e053e3d2beac2feb0f676e77577a20bbbde4c921cf830e9a803fd001a43b5441c1edff5a94e3b00837279286f613da3d9402f07ee06