Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe
Resource
win10v2004-20221111-en
General
-
Target
dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe
-
Size
8.2MB
-
MD5
c50570558f1fa95225c72ac974eb631a
-
SHA1
caf2081be16dd9738ae06e85b8464bbeaac1fef0
-
SHA256
dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8
-
SHA512
e159c2f1c99a87c3aa47152edcd19145fec8b6fd06b3f65410487d0d7ba0b00b8e0fc1f2d4fdb26c9d425e1c2a216f7eb206f2d2086d100aa635b6102b894545
-
SSDEEP
196608:MS1SCw5ygwmaNPYL0q9aIeJhYDD8QWKaQ/s6HVf32gGgvHT4xt40aOgv:11SCw5umaetaIwYDIXQzf32sHTqt4j
Malware Config
Extracted
colibri
1.2.0
bot
http://oraycdn.com/gate.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 DllHelper.exe -
Deletes itself 1 IoCs
pid Process 1816 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 2024 DllHelper.exe 2024 DllHelper.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 860 2024 DllHelper.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1740 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 2024 DllHelper.exe 2024 DllHelper.exe 2024 DllHelper.exe 2024 DllHelper.exe 2024 DllHelper.exe 2024 DllHelper.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2044 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 26 PID 1184 wrote to memory of 2044 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 26 PID 1184 wrote to memory of 2044 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 26 PID 1184 wrote to memory of 2044 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 26 PID 1184 wrote to memory of 2024 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 28 PID 1184 wrote to memory of 2024 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 28 PID 1184 wrote to memory of 2024 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 28 PID 1184 wrote to memory of 2024 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 28 PID 1184 wrote to memory of 1816 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 29 PID 1184 wrote to memory of 1816 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 29 PID 1184 wrote to memory of 1816 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 29 PID 1184 wrote to memory of 1816 1184 dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe 29 PID 1816 wrote to memory of 1696 1816 cmd.exe 31 PID 1816 wrote to memory of 1696 1816 cmd.exe 31 PID 1816 wrote to memory of 1696 1816 cmd.exe 31 PID 1816 wrote to memory of 1696 1816 cmd.exe 31 PID 1816 wrote to memory of 1740 1816 cmd.exe 32 PID 1816 wrote to memory of 1740 1816 cmd.exe 32 PID 1816 wrote to memory of 1740 1816 cmd.exe 32 PID 1816 wrote to memory of 1740 1816 cmd.exe 32 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33 PID 2024 wrote to memory of 860 2024 DllHelper.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe"C:\Users\Admin\AppData\Local\Temp\dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Creates scheduled task(s)
PID:2044
-
-
C:\Users\Admin\AppVerif\DllHelper.exe"C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\dd6b0783dfd0ce4ff0d8a3f9fec6be4238ea99eef46d6000dbe04cb3c1d83ff8.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1696
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76.4MB
MD559b24b893297981df0b4aa8ff9a9731a
SHA1376d7230097cc91852710e419bb99d0469c532fa
SHA256d69d45832b18b41cb637dcfb63a2c1cf0d59cd11748f974bbebfb19a03aa31c0
SHA512e22b98d7b30cbf6d7425cba0c1b316a5bbbb9ba111b7045ff2e8fd89b70545a30fb1883dd5ea6c674b99e0eade743f2d7f70a5a96e2173e3e3bfefdb59c30d79
-
Filesize
88.0MB
MD50e8ec98c78d5a91e02f7580fbb6ec1a5
SHA1c17c2004b34e991689870b63a502f55b91a2a226
SHA256b9812d90aeb2172f456962903c49de817d355c284374a95ec859248e8ce904d7
SHA512fa21a9287519057c164f1ae71a48bd4e527acb552e653f536b4ce45e363c563532d3a825b2d0e2cb0567bf58bcc0a0ef9cefe8c1bdefe9924a84b296e0e38f54
-
Filesize
70.1MB
MD57b39c3c87fb325892e5e9cb350aab3b2
SHA1019de63605b7fec2e657629d44546baeccc29291
SHA256cf43e16a375eb2e8fe4aac756774ea7bfb7e5b492c05175d7bc5983d22657911
SHA512d067c0a3764c46879d6f5c8cdc7452ca5b24bec2da1b9c7b4de5184fc7f5c01f5862128096906827922fff2cb64e83636ef201175aa39d72b04987dce94f2999
-
Filesize
79.7MB
MD5835abe040efafdc9394374accc926f65
SHA17a7f52063b3c9158643ad2bd3a126278e04d0cd1
SHA256975011c36a5fa0f66869ca7b3894ae0b8515ed3057748990210a618cf4bb94c4
SHA512eda587327f57177c6be865eeaa0be707b034d379bf59cf5f9a4536ff4d6d57b5e682e5c1498799b97d2a16032df13523beb27ae8ba98870257e485b30c950477