Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe
Resource
win7-20220901-en
General
-
Target
fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe
-
Size
294KB
-
MD5
16e8f1670668384884715f4efbbbebd1
-
SHA1
3f8bc0ef848ecebf1f6c24c47fcf8d225de20b60
-
SHA256
fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5
-
SHA512
72d25a5ebef7353fa7f9f62e4d58dfbaa9e248e0a6e035dd1455e174c7be0a79692d30e3a81d01ea80c4271aa77052ee83a032f46843285f02f95cf27f761b41
-
SSDEEP
3072:JOC+EnCeqk1oPh1MZf8EQ1DyWgi/ysf0eC:EYN9oJ1MZ0JGW5rfs
Malware Config
Extracted
raccoon
d6584fcd1734d77c0004e30a172dc0e0
http://84.32.188.111/
http://5.252.21.28/
http://87.120.254.71
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
conhost.execonhost.exepid process 4112 conhost.exe 3808 conhost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.execonhost.exedescription pid process target process PID 680 set thread context of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 4112 set thread context of 3808 4112 conhost.exe conhost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.execonhost.exedescription pid process target process PID 680 wrote to memory of 4112 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe conhost.exe PID 680 wrote to memory of 4112 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe conhost.exe PID 680 wrote to memory of 4112 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe conhost.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 680 wrote to memory of 3212 680 fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe PID 4112 wrote to memory of 3808 4112 conhost.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe"C:\Users\Admin\AppData\Local\Temp\fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\conhost.exe"C:\ProgramData\conhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\conhost.exe"C:\ProgramData\conhost.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe"C:\Users\Admin\AppData\Local\Temp\fce7f27c7e2b58c267207aaf13c3a115f34487fd551aced03f85e2977c0932c5.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\conhost.exeFilesize
74KB
MD5cdd3d44d9e64a113618961f0a4e691b9
SHA1a762037bc50ddb7507d5ef1a20ce813ad990bb54
SHA256dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0
SHA51255146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8
-
C:\ProgramData\conhost.exeFilesize
74KB
MD5cdd3d44d9e64a113618961f0a4e691b9
SHA1a762037bc50ddb7507d5ef1a20ce813ad990bb54
SHA256dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0
SHA51255146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8
-
C:\ProgramData\conhost.exeFilesize
74KB
MD5cdd3d44d9e64a113618961f0a4e691b9
SHA1a762037bc50ddb7507d5ef1a20ce813ad990bb54
SHA256dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0
SHA51255146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8
-
memory/3212-134-0x0000000000000000-mapping.dmp
-
memory/3212-136-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3212-140-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3212-144-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3808-141-0x0000000000000000-mapping.dmp
-
memory/3808-142-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/3808-145-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/4112-132-0x0000000000000000-mapping.dmp