Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2022 01:25

General

  • Target

    d952bdc073ff3deb4bcc3cb96cbacd01.exe

  • Size

    708KB

  • MD5

    d952bdc073ff3deb4bcc3cb96cbacd01

  • SHA1

    6d283b4acf37dcea8d9f62cf09ddf5deb5c6c5cd

  • SHA256

    1b985ca2f29c8079d6fe60804a838989582e11724e7b1ab75f393f01b941806d

  • SHA512

    19781a2787e53c89d7006aba1f68047fabaf74e18d13b081df18498a677d68518a62c8c41d21770999ef770a89ae88a7bdc0b8dcc197262b109b24160d974974

Score
10/10

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d952bdc073ff3deb4bcc3cb96cbacd01.exe
    "C:\Users\Admin\AppData\Local\Temp\d952bdc073ff3deb4bcc3cb96cbacd01.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\ProgramData\conhost.exe
      "C:\ProgramData\conhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\ProgramData\conhost.exe
        "C:\ProgramData\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Windows\SysWOW64\schtasks.exe
          /create /tn COMSurrogate /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "powershell.exe -windowstyle hidden"
          4⤵
          • Creates scheduled task(s)
          PID:2784
        • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
          "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4152
          • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
            "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"
            5⤵
            • Executes dropped EXE
            PID:864
    • C:\Users\Admin\AppData\Local\Temp\d952bdc073ff3deb4bcc3cb96cbacd01.exe
      "C:\Users\Admin\AppData\Local\Temp\d952bdc073ff3deb4bcc3cb96cbacd01.exe"
      2⤵
        PID:4728
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
        "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe" Name host ValueOnly True
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
          "C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe"
          3⤵
          • Executes dropped EXE
          PID:596

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\conhost.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\ProgramData\conhost.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\ProgramData\conhost.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Get-Variable.exe
      Filesize

      52KB

      MD5

      d8e1495b46cded57eb1423b8bb789834

      SHA1

      db64bc20550e51c602dbb92d07c8f02842efebcc

      SHA256

      aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

      SHA512

      8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

    • memory/596-159-0x0000000000000000-mapping.dmp
    • memory/864-149-0x0000000000000000-mapping.dmp
    • memory/2540-158-0x0000000000FC3000-0x0000000000FC9000-memory.dmp
      Filesize

      24KB

    • memory/2540-156-0x0000000000000000-mapping.dmp
    • memory/2784-144-0x0000000000000000-mapping.dmp
    • memory/4152-145-0x0000000000000000-mapping.dmp
    • memory/4408-152-0x000001C7727B0000-0x000001C7727D2000-memory.dmp
      Filesize

      136KB

    • memory/4408-162-0x00007FF936EC0000-0x00007FF937981000-memory.dmp
      Filesize

      10.8MB

    • memory/4408-155-0x000001C772DB0000-0x000001C772E26000-memory.dmp
      Filesize

      472KB

    • memory/4408-154-0x000001C772CE0000-0x000001C772D24000-memory.dmp
      Filesize

      272KB

    • memory/4408-153-0x00007FF936EC0000-0x00007FF937981000-memory.dmp
      Filesize

      10.8MB

    • memory/4672-130-0x0000000000000000-mapping.dmp
    • memory/4728-136-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4728-139-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4728-140-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4728-141-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4728-143-0x0000000000400000-0x000000000045E000-memory.dmp
      Filesize

      376KB

    • memory/4728-134-0x0000000000000000-mapping.dmp
    • memory/4804-131-0x000000000091B000-0x0000000000929000-memory.dmp
      Filesize

      56KB

    • memory/5024-148-0x0000000000400000-0x0000000000407000-memory.dmp
      Filesize

      28KB

    • memory/5024-135-0x0000000000000000-mapping.dmp
    • memory/5024-137-0x0000000000400000-0x0000000000407000-memory.dmp
      Filesize

      28KB

    • memory/5024-142-0x0000000000400000-0x0000000000407000-memory.dmp
      Filesize

      28KB