Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
447KB
-
MD5
c6370fd9fec5500a8eb3a0c6a7cb9999
-
SHA1
ce87cba0d983f1d85e3a65a0351b4b5d15da31b4
-
SHA256
6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297
-
SHA512
0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774
-
SSDEEP
6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU
Malware Config
Extracted
colibri
1.4.1
bot
http://oraycdn.com/gate.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4616 created 3136 4616 file.exe 38 -
Executes dropped EXE 4 IoCs
pid Process 3800 @2RLl.exe 4824 dllhost.exe 3236 dllhost.exe 1416 dllhost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 4036 4616 WerFault.exe 82 3288 3800 WerFault.exe 94 1876 3236 WerFault.exe 99 916 1416 WerFault.exe 102 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4616 file.exe 4616 file.exe 4616 file.exe 4616 file.exe 1640 certreq.exe 1640 certreq.exe 1640 certreq.exe 1640 certreq.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1640 4616 file.exe 83 PID 4616 wrote to memory of 1640 4616 file.exe 83 PID 4616 wrote to memory of 1640 4616 file.exe 83 PID 4616 wrote to memory of 1640 4616 file.exe 83 PID 3800 wrote to memory of 3096 3800 @2RLl.exe 95 PID 3800 wrote to memory of 3096 3800 @2RLl.exe 95 PID 3800 wrote to memory of 3096 3800 @2RLl.exe 95 PID 3800 wrote to memory of 4824 3800 @2RLl.exe 96 PID 3800 wrote to memory of 4824 3800 @2RLl.exe 96 PID 3800 wrote to memory of 4824 3800 @2RLl.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 8123⤵
- Program crash
PID:4036
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4616 -ip 46161⤵PID:3904
-
C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe"C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\schtasks.exe/create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Creates scheduled task(s)
PID:3096
-
-
C:\Users\Admin\Documents\Bandicam\dllhost.exe"C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 18082⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3800 -ip 38001⤵PID:1564
-
C:\Users\Admin\Documents\Bandicam\dllhost.exeC:\Users\Admin\Documents\Bandicam\dllhost.exe1⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 3522⤵
- Program crash
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3236 -ip 32361⤵PID:2400
-
C:\Users\Admin\Documents\Bandicam\dllhost.exeC:\Users\Admin\Documents\Bandicam\dllhost.exe1⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 3482⤵
- Program crash
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1416 -ip 14161⤵PID:2308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
300B
MD5dec6bbe308eb44937f77160a25ee32db
SHA18f08a4b641b564b67205e00106ca6bd9ca46fc6e
SHA25668a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e
SHA5126c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5397c3874d49c758a2d7d4158524d2764
SHA1bb614c5a0de0aef498c2e3aa351b694079572fb4
SHA2568a2c0e5ab0c065ab51d0b54f3ab0e4c0c7586a1584f0b2b36c48cf2b69845528
SHA51275ff3d7dd92eb85b834ca3e5020be9b9bb5e26f133db66ae0f7fdc33f2ee6a1af19b2cc8be1be648bfb43ac25b9622e5f1d6d3ae865bcb354e31170cc6b3df4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD5168c2115ce62417b925ee100340a5db3
SHA1eeb2174f78f732545158883b60fc5a74e688156a
SHA25676b173183720845215854ff78a9dec27abfda09633ffcf053dd6235f56c61f50
SHA512d19d14fb94b1c0c505d8bbbe514940af68dab071776289d2e577994cbda3f539bbbc3389f0b7658122c7542cdb0bf77a23e1f6957665e2bc398e0b8fb910d91a
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9