Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2023 14:59

General

  • Target

    file.exe

  • Size

    447KB

  • MD5

    c6370fd9fec5500a8eb3a0c6a7cb9999

  • SHA1

    ce87cba0d983f1d85e3a65a0351b4b5d15da31b4

  • SHA256

    6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297

  • SHA512

    0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774

  • SSDEEP

    6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU

Malware Config

Extracted

Family

colibri

Version

1.4.1

Botnet

bot

C2

http://oraycdn.com/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:832
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Deletes itself
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:1164
    • C:\Users\Admin\AppData\Local\Microsoft\[email protected]
      "C:\Users\Admin\AppData\Local\Microsoft\[email protected]"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SysWOW64\schtasks.exe
        /create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
        2⤵
        • Creates scheduled task(s)
        PID:364
      • C:\Users\Admin\Documents\Bandicam\dllhost.exe
        "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
        2⤵
        • Executes dropped EXE
        PID:1644
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {BDA3A6A4-6B82-42E6-A110-DFFA4FEDD440} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\Documents\Bandicam\dllhost.exe
        C:\Users\Admin\Documents\Bandicam\dllhost.exe
        2⤵
        • Executes dropped EXE
        PID:932

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      60fe01df86be2e5331b0cdbe86165686

      SHA1

      2a79f9713c3f192862ff80508062e64e8e0b29bd

      SHA256

      c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

      SHA512

      ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      300B

      MD5

      dec6bbe308eb44937f77160a25ee32db

      SHA1

      8f08a4b641b564b67205e00106ca6bd9ca46fc6e

      SHA256

      68a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e

      SHA512

      6c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      965a1b1f6db5d51972778e5250d3a990

      SHA1

      079fed571daccb6ab10f72f6e8d816a72dcd57fe

      SHA256

      db9e03acceceda14656ab0f5c4a1ba07ac7a46cb02caddbc283d5071e1ada8fb

      SHA512

      4f11c619207a50f41d0199e06745d86ebbc176e82eb065ed92a8525d1e38f9c1f4b28e0d71392b8692b6a3f8215663cc25304f320801370c968cea29a09929aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      192B

      MD5

      f09c7ce1f366d5e2a2c2dcc9f7f170d3

      SHA1

      f9b382d3188dc2a2b5a5b1eec0e537966db83c5f

      SHA256

      ffafe4c052a116e784d2626048f814358a04708f9bc879f0782cd5a3e0196ede

      SHA512

      afc6fb2814350ed3d53341e24c2a81522732c64bb2d195d6aabfb5023d9ed74ce9c379844dbe98a08944684bb26a353671ac8443e64c88ba98321d52fa660ee4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c0ff2992f17a65198222aec32bf0270d

      SHA1

      623d0f14905e87d5e97d94ec0579202448665837

      SHA256

      730e8741caabdb70017804d70238aad9df231f3234b6411f2b25af8bf63863d5

      SHA512

      15f372cf6c53f0268be4f31afd31320eac5dcc859668344c35dfc798df923dae540d36d40838c80eb535a3a5381c0a8a1a16777a0dc634d31a7a8f5f4598f151

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      be599233c88cf4f699b97e9c04becaa4

      SHA1

      c61218ab5459bcf0ce37318683526dfa2e379d8a

      SHA256

      8d5ff3f42022fd2ddd4f0f607a8c7973272068920d1ee51d317e51fd2d8b4930

      SHA512

      1b80da058d7e0ef540708ae365b4eff001fd8b1fcbcc457332618640924953daf51e2acafb0a31cdd8d4f5e0fb980420f12bf9c7486f7c1cdd71114f882edcc2

    • C:\Users\Admin\AppData\Local\Microsoft\[email protected]

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\AppData\Local\Microsoft\[email protected]

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\AppData\Local\Temp\CabD8A6.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarDB1D.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • \Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • \Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • memory/832-61-0x0000000002920000-0x0000000002956000-memory.dmp

      Filesize

      216KB

    • memory/832-67-0x0000000002920000-0x0000000002956000-memory.dmp

      Filesize

      216KB

    • memory/832-55-0x00000000004F0000-0x0000000000561000-memory.dmp

      Filesize

      452KB

    • memory/832-69-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/832-59-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/832-58-0x0000000001EF0000-0x00000000022F0000-memory.dmp

      Filesize

      4.0MB

    • memory/832-57-0x0000000001EF0000-0x00000000022F0000-memory.dmp

      Filesize

      4.0MB

    • memory/832-56-0x00000000003C0000-0x00000000003C7000-memory.dmp

      Filesize

      28KB

    • memory/932-253-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1164-73-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-78-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-60-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/1164-83-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-82-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-81-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-70-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/1164-80-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-79-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-71-0x00000000000B0000-0x00000000000B7000-memory.dmp

      Filesize

      28KB

    • memory/1164-76-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-74-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-75-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1164-72-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1644-244-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1788-97-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1788-192-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1788-87-0x0000000000220000-0x0000000000226000-memory.dmp

      Filesize

      24KB