Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2022 07:51

General

  • Target

    AE40B1604E91A796697711123B511B4404635B7297C4E.exe

  • Size

    4.9MB

  • MD5

    1ec352f87b2a0f057fad1a1d8fdb4fb0

  • SHA1

    6fde03bf354eb22766eeda3063c5513257723ee6

  • SHA256

    ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc

  • SHA512

    047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f

  • SSDEEP

    98304:I+m3o+rxVmA8OM6KPigiaFfqw1crsT/e3Le7dqc:It42VmhOM6KPNiSqw1cwTu+l

Score
10/10

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AE40B1604E91A796697711123B511B4404635B7297C4E.exe
    "C:\Users\Admin\AppData\Local\Temp\AE40B1604E91A796697711123B511B4404635B7297C4E.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe"
        3⤵
        • Executes dropped EXE
        PID:4628
    • C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:3928
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3412
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4264
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3460
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\odt\taskhostw.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4672
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4644
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1280
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4608
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4708
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:924
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 7 /tr "'C:\Program Files\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4584
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4028
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1264
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Documents\My Pictures\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4504
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4052
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Documents\My Pictures\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3928
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:640
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2340
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2264

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe
    Filesize

    4.9MB

    MD5

    1ec352f87b2a0f057fad1a1d8fdb4fb0

    SHA1

    6fde03bf354eb22766eeda3063c5513257723ee6

    SHA256

    ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc

    SHA512

    047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f

  • C:\Program Files (x86)\Mozilla Maintenance Service\logs\sihost.exe
    Filesize

    4.9MB

    MD5

    1ec352f87b2a0f057fad1a1d8fdb4fb0

    SHA1

    6fde03bf354eb22766eeda3063c5513257723ee6

    SHA256

    ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc

    SHA512

    047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f

  • C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • C:\Users\Admin\AppData\Local\Temp\tmp14D6.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • C:\Users\Admin\AppData\Local\Temp\tmpF368.tmp.exe
    Filesize

    52KB

    MD5

    d8e1495b46cded57eb1423b8bb789834

    SHA1

    db64bc20550e51c602dbb92d07c8f02842efebcc

    SHA256

    aa2d97b5be06be67ec04774ad681da6113ee2b4929c0539929bbac19926682c8

    SHA512

    8b785d7f8d5fdf12dd9a5414050d403e861fd3f9ac09bceebc57b2f178c6f145389783ed1035b5e6f9b627b3d4d978f3ad9bf8195d92e20f585ef92667e4cabb

  • memory/1852-150-0x00007FFE848F0000-0x00007FFE853B1000-memory.dmp
    Filesize

    10.8MB

  • memory/1852-144-0x0000000000000000-mapping.dmp
  • memory/1852-148-0x00007FFE848F0000-0x00007FFE853B1000-memory.dmp
    Filesize

    10.8MB

  • memory/2840-134-0x00007FFE848F0000-0x00007FFE853B1000-memory.dmp
    Filesize

    10.8MB

  • memory/2840-142-0x000000001DAA0000-0x000000001DAF0000-memory.dmp
    Filesize

    320KB

  • memory/2840-143-0x000000001F420000-0x000000001F948000-memory.dmp
    Filesize

    5.2MB

  • memory/2840-133-0x00007FFE848F0000-0x00007FFE853B1000-memory.dmp
    Filesize

    10.8MB

  • memory/2840-147-0x00007FFE848F0000-0x00007FFE853B1000-memory.dmp
    Filesize

    10.8MB

  • memory/2840-132-0x0000000000930000-0x0000000000E16000-memory.dmp
    Filesize

    4.9MB

  • memory/2864-135-0x0000000000000000-mapping.dmp
  • memory/3152-151-0x0000000000000000-mapping.dmp
  • memory/3928-157-0x0000000000400000-0x0000000000407000-memory.dmp
    Filesize

    28KB

  • memory/3928-154-0x0000000000000000-mapping.dmp
  • memory/4628-139-0x0000000000400000-0x0000000000407000-memory.dmp
    Filesize

    28KB

  • memory/4628-149-0x0000000000400000-0x0000000000407000-memory.dmp
    Filesize

    28KB

  • memory/4628-138-0x0000000000000000-mapping.dmp
  • memory/4628-141-0x0000000000400000-0x0000000000407000-memory.dmp
    Filesize

    28KB