Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-02-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe
Resource
win7-20221111-en
General
-
Target
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe
-
Size
8.2MB
-
MD5
3945a1aabe76ee6d60ccf79f24ca5487
-
SHA1
f524ed975bc76b1f8c1aee43b2a82c766778b3ee
-
SHA256
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e
-
SHA512
1f7cfde412bda3096bab0696b7b9de709b25d25b741e67140eb68a55b8e821a745f957a9e08aaefd1aa48ffd9bd1e395a615123607f67d0ac3f62c929776794a
-
SSDEEP
196608:YBz5EaignhjIfak4XMaiz8qL1HZiC1GnQmf4y:G5fhAanXMt8WRZp17q
Malware Config
Extracted
colibri
1.2.0
bot
http://oraycdn.com/gate.php
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1284 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
DllHelper.exepid process 468 DllHelper.exe -
Loads dropped DLL 2 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exepid process 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exeDllHelper.exepid process 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 468 DllHelper.exe 468 DllHelper.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DllHelper.exedescription pid process target process PID 468 set thread context of 1648 468 DllHelper.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exeDllHelper.exepid process 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 468 DllHelper.exe 468 DllHelper.exe 468 DllHelper.exe 468 DllHelper.exe 468 DllHelper.exe 468 DllHelper.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.execmd.exeDllHelper.exedescription pid process target process PID 1208 wrote to memory of 1504 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 1208 wrote to memory of 1504 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 1208 wrote to memory of 1504 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 1208 wrote to memory of 1504 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 1208 wrote to memory of 468 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 1208 wrote to memory of 468 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 1208 wrote to memory of 468 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 1208 wrote to memory of 468 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 1208 wrote to memory of 1284 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 1208 wrote to memory of 1284 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 1208 wrote to memory of 1284 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 1208 wrote to memory of 1284 1208 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 1284 wrote to memory of 1652 1284 cmd.exe chcp.com PID 1284 wrote to memory of 1652 1284 cmd.exe chcp.com PID 1284 wrote to memory of 1652 1284 cmd.exe chcp.com PID 1284 wrote to memory of 1652 1284 cmd.exe chcp.com PID 1284 wrote to memory of 2020 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 2020 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 2020 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 2020 1284 cmd.exe PING.EXE PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1760 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe PID 468 wrote to memory of 1648 468 DllHelper.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppVerif\DllHelper.exe"C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppVerif\DllHelper.exeFilesize
507.3MB
MD588cca7df20d1b1767ef14e62813966b1
SHA1553792282a5431bdd5e02ee97eee79b5329de084
SHA2565b3055d3f9b2bb7835c29751062f18ad044291fe3d3b6aa7639c8f358396182c
SHA5122dd99c52d16cc35e8377ba2bc4de83b6b9c10358e1d7427f687da0732fdbee9ddcb326c736c3ba2c4b92ae6e0fac4dc0750638d07ffec1bfb2e96890a498f36e
-
C:\Users\Admin\AppVerif\DllHelper.exeFilesize
447.2MB
MD5ea7f8fe76d3dff6b29e0e755afd1c73e
SHA193c75531d56eeb4a81c35199886cd30d028b3102
SHA25607ed198dcc845e109409acff9cc074518399fab5e378cfc51021ce1e94b40e1e
SHA51254ca40b41ca67517ca47ed2dcec83ecbf4874a43e8fd8c759ae124bea064ed837c65a1225f6dcee91bbb7e20db26629978969f43d45e07bf896c0f8a031c95c9
-
\Users\Admin\AppVerif\DllHelper.exeFilesize
462.1MB
MD540bb0bf74e0879b7be641b7815235534
SHA11c33323c990708472165365de436fbf0d59a87e4
SHA25608dd6b00a9c56893d6d8a1c24cd7aa82656bed402490589685b78634e049c3e0
SHA51227d1dbbe8b4288deb9cf43fdfdce98dc80f58acc1d199c6f8f8fbff4a0cce948c0859dc6ff07edb288d51025e33d90ce907853cd65b76dd94349b183765c3572
-
\Users\Admin\AppVerif\DllHelper.exeFilesize
505.6MB
MD5c2b1df931ce3d9e93093f35f2c7d36fd
SHA1238c9c3f850129e2a7864402506da1d1520d6ead
SHA25610c2d6775ad13be5a5674cc451775ba6ecbf1d486e35ecd4ccde64da313d6c29
SHA51238f3aef27aa6732e87f74885138263a42ae196e4e9f3b1c97d542954d86db6d7f9ea054a17cc934bbb2067b813bc878769ea05d65fccda8664815df5bd98194e
-
memory/468-81-0x0000000002DC0000-0x0000000003359000-memory.dmpFilesize
5.6MB
-
memory/468-72-0x0000000000310000-0x00000000010C9000-memory.dmpFilesize
13.7MB
-
memory/468-92-0x0000000003360000-0x00000000034C1000-memory.dmpFilesize
1.4MB
-
memory/468-91-0x0000000000310000-0x00000000010C9000-memory.dmpFilesize
13.7MB
-
memory/468-86-0x00000000013C0000-0x0000000001438000-memory.dmpFilesize
480KB
-
memory/468-85-0x00000000013C0000-0x0000000001438000-memory.dmpFilesize
480KB
-
memory/468-84-0x0000000003360000-0x00000000034C1000-memory.dmpFilesize
1.4MB
-
memory/468-82-0x0000000003360000-0x00000000034C1000-memory.dmpFilesize
1.4MB
-
memory/468-80-0x0000000002DC0000-0x0000000003359000-memory.dmpFilesize
5.6MB
-
memory/468-68-0x0000000000000000-mapping.dmp
-
memory/468-74-0x0000000000310000-0x00000000010C9000-memory.dmpFilesize
13.7MB
-
memory/1208-58-0x0000000002C40000-0x00000000031D9000-memory.dmpFilesize
5.6MB
-
memory/1208-54-0x0000000000320000-0x00000000010D9000-memory.dmpFilesize
13.7MB
-
memory/1208-61-0x0000000075591000-0x0000000075593000-memory.dmpFilesize
8KB
-
memory/1208-57-0x0000000002C40000-0x00000000031D9000-memory.dmpFilesize
5.6MB
-
memory/1208-62-0x0000000000320000-0x00000000010D9000-memory.dmpFilesize
13.7MB
-
memory/1208-77-0x0000000000320000-0x00000000010D9000-memory.dmpFilesize
13.7MB
-
memory/1208-63-0x0000000002C40000-0x00000000031D9000-memory.dmpFilesize
5.6MB
-
memory/1208-78-0x00000000031E0000-0x0000000003341000-memory.dmpFilesize
1.4MB
-
memory/1208-60-0x00000000031E0000-0x0000000003341000-memory.dmpFilesize
1.4MB
-
memory/1208-56-0x0000000000320000-0x00000000010D9000-memory.dmpFilesize
13.7MB
-
memory/1208-59-0x00000000031E0000-0x0000000003341000-memory.dmpFilesize
1.4MB
-
memory/1208-65-0x00000000031E0000-0x0000000003341000-memory.dmpFilesize
1.4MB
-
memory/1284-71-0x0000000000000000-mapping.dmp
-
memory/1504-64-0x0000000000000000-mapping.dmp
-
memory/1648-87-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1648-89-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1648-93-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1652-76-0x0000000000000000-mapping.dmp
-
memory/2020-79-0x0000000000000000-mapping.dmp