Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe
Resource
win7-20221111-en
General
-
Target
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe
-
Size
8.2MB
-
MD5
3945a1aabe76ee6d60ccf79f24ca5487
-
SHA1
f524ed975bc76b1f8c1aee43b2a82c766778b3ee
-
SHA256
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e
-
SHA512
1f7cfde412bda3096bab0696b7b9de709b25d25b741e67140eb68a55b8e821a745f957a9e08aaefd1aa48ffd9bd1e395a615123607f67d0ac3f62c929776794a
-
SSDEEP
196608:YBz5EaignhjIfak4XMaiz8qL1HZiC1GnQmf4y:G5fhAanXMt8WRZp17q
Malware Config
Extracted
colibri
1.2.0
bot
http://oraycdn.com/gate.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe -
Executes dropped EXE 1 IoCs
Processes:
DllHelper.exepid process 2668 DllHelper.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exeDllHelper.exepid process 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 2668 DllHelper.exe 2668 DllHelper.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DllHelper.exedescription pid process target process PID 2668 set thread context of 1516 2668 DllHelper.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exeDllHelper.exepid process 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe 2668 DllHelper.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.execmd.exeDllHelper.exedescription pid process target process PID 4760 wrote to memory of 3660 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 4760 wrote to memory of 3660 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 4760 wrote to memory of 3660 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe schtasks.exe PID 4760 wrote to memory of 2668 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 4760 wrote to memory of 2668 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 4760 wrote to memory of 2668 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe DllHelper.exe PID 4760 wrote to memory of 824 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 4760 wrote to memory of 824 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 4760 wrote to memory of 824 4760 06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe cmd.exe PID 824 wrote to memory of 3732 824 cmd.exe chcp.com PID 824 wrote to memory of 3732 824 cmd.exe chcp.com PID 824 wrote to memory of 3732 824 cmd.exe chcp.com PID 824 wrote to memory of 1444 824 cmd.exe PING.EXE PID 824 wrote to memory of 1444 824 cmd.exe PING.EXE PID 824 wrote to memory of 1444 824 cmd.exe PING.EXE PID 2668 wrote to memory of 1516 2668 DllHelper.exe InstallUtil.exe PID 2668 wrote to memory of 1516 2668 DllHelper.exe InstallUtil.exe PID 2668 wrote to memory of 1516 2668 DllHelper.exe InstallUtil.exe PID 2668 wrote to memory of 1516 2668 DllHelper.exe InstallUtil.exe PID 2668 wrote to memory of 1516 2668 DllHelper.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppVerif\DllHelper.exe"C:\Users\Admin\AppVerif\DllHelper.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\06af62965ce16e6f497c93feb98e9a0e63f7f05853c519ca84de943182da371e.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppVerif\DllHelper.exeFilesize
763.2MB
MD53137ab130e997fc7b7351721979cde45
SHA15620874578f3af5c3b8bd7df15d21f97e9372b1f
SHA2565e2aeb2886d59607703851f741311f71d7c35c7e744e76cd53ff6b35d44a767d
SHA512c7b6dcc5ae3c2d6073c4c4693531a56d4e80bfcaaff92c519d79504297d5d7dba94c7aee70a9467316063ab5d6e79f7d067578606858dec0d85a184a810dc6ec
-
C:\Users\Admin\AppVerif\DllHelper.exeFilesize
763.2MB
MD53137ab130e997fc7b7351721979cde45
SHA15620874578f3af5c3b8bd7df15d21f97e9372b1f
SHA2565e2aeb2886d59607703851f741311f71d7c35c7e744e76cd53ff6b35d44a767d
SHA512c7b6dcc5ae3c2d6073c4c4693531a56d4e80bfcaaff92c519d79504297d5d7dba94c7aee70a9467316063ab5d6e79f7d067578606858dec0d85a184a810dc6ec
-
memory/824-143-0x0000000000000000-mapping.dmp
-
memory/1444-148-0x0000000000000000-mapping.dmp
-
memory/1516-158-0x0000000000000000-mapping.dmp
-
memory/1516-165-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1516-163-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1516-161-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1516-159-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/2668-157-0x000000000355F000-0x0000000003AF8000-memory.dmpFilesize
5.6MB
-
memory/2668-155-0x0000000012840000-0x00000000128B8000-memory.dmpFilesize
480KB
-
memory/2668-164-0x0000000003397000-0x00000000034F8000-memory.dmpFilesize
1.4MB
-
memory/2668-140-0x0000000000000000-mapping.dmp
-
memory/2668-162-0x0000000000450000-0x0000000001209000-memory.dmpFilesize
13.7MB
-
memory/2668-156-0x0000000012840000-0x00000000128B8000-memory.dmpFilesize
480KB
-
memory/2668-150-0x0000000000450000-0x0000000001209000-memory.dmpFilesize
13.7MB
-
memory/2668-149-0x0000000000450000-0x0000000001209000-memory.dmpFilesize
13.7MB
-
memory/2668-152-0x000000000355F000-0x0000000003AF8000-memory.dmpFilesize
5.6MB
-
memory/2668-153-0x0000000000450000-0x0000000001209000-memory.dmpFilesize
13.7MB
-
memory/2668-154-0x0000000003397000-0x00000000034F8000-memory.dmpFilesize
1.4MB
-
memory/3660-139-0x0000000000000000-mapping.dmp
-
memory/3732-147-0x0000000000000000-mapping.dmp
-
memory/4760-144-0x0000000000DD0000-0x0000000001B89000-memory.dmpFilesize
13.7MB
-
memory/4760-133-0x0000000000DD0000-0x0000000001B89000-memory.dmpFilesize
13.7MB
-
memory/4760-138-0x0000000003C8C000-0x0000000004225000-memory.dmpFilesize
5.6MB
-
memory/4760-135-0x0000000003C8C000-0x0000000004225000-memory.dmpFilesize
5.6MB
-
memory/4760-136-0x0000000004235000-0x0000000004396000-memory.dmpFilesize
1.4MB
-
memory/4760-137-0x0000000000DD0000-0x0000000001B89000-memory.dmpFilesize
13.7MB
-
memory/4760-146-0x0000000004235000-0x0000000004396000-memory.dmpFilesize
1.4MB
-
memory/4760-145-0x0000000004235000-0x0000000004396000-memory.dmpFilesize
1.4MB