Analysis
-
max time kernel
105s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09-02-2023 04:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10-20220901-en
windows10-1703-x64
11 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.7MB
-
MD5
a98cf7d9ef915f3c3cb16d731eb43ff9
-
SHA1
51110199aae9e5546a8b6e29e62a0a629ab29618
-
SHA256
a3d5c655cfd386f82cae077d2db8b8c5c64eb560260eca223442f678635349f0
-
SHA512
2ad5bf1357ac2a89c78b5f7066b759924cb78a90c5643f93b05c1c0d59b8dc0b860549cfd5fbff3ef65c0c7068c2b64cea425db74afe57071c5245773b881dc8
-
SSDEEP
6144:phdPbOhpdUK5rvyKMdF2Xzw4JttcBDlxdwpfxfBThM9eo1I7u0Kry2wej993RUgV:3tbO5WKeg5fBTy9eo1drf
Malware Config
Extracted
Family
colibri
Version
1.4.0
Botnet
exploits
C2
http://194.4.49.243/gate.php
rc4.plain
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1116 set thread context of 888 1116 file.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27 PID 1116 wrote to memory of 888 1116 file.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:888
-