Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 14:59

General

  • Target

    file.exe

  • Size

    447KB

  • MD5

    c6370fd9fec5500a8eb3a0c6a7cb9999

  • SHA1

    ce87cba0d983f1d85e3a65a0351b4b5d15da31b4

  • SHA256

    6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297

  • SHA512

    0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774

  • SSDEEP

    6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU

Malware Config

Extracted

Family

colibri

Version

1.4.1

Botnet

bot

C2

http://oraycdn.com/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Program crash 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3136
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 812
          3⤵
          • Program crash
          PID:4036
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:1640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4616 -ip 4616
      1⤵
        PID:3904
      • C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe
        "C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3800
        • C:\Windows\SysWOW64\schtasks.exe
          /create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
          2⤵
          • Creates scheduled task(s)
          PID:3096
        • C:\Users\Admin\Documents\Bandicam\dllhost.exe
          "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
          2⤵
          • Executes dropped EXE
          PID:4824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 1808
          2⤵
          • Program crash
          PID:3288
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3800 -ip 3800
        1⤵
          PID:1564
        • C:\Users\Admin\Documents\Bandicam\dllhost.exe
          C:\Users\Admin\Documents\Bandicam\dllhost.exe
          1⤵
          • Executes dropped EXE
          PID:3236
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 352
            2⤵
            • Program crash
            PID:1876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3236 -ip 3236
          1⤵
            PID:2400
          • C:\Users\Admin\Documents\Bandicam\dllhost.exe
            C:\Users\Admin\Documents\Bandicam\dllhost.exe
            1⤵
            • Executes dropped EXE
            PID:1416
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 348
              2⤵
              • Program crash
              PID:916
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1416 -ip 1416
            1⤵
              PID:2308

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

              Filesize

              717B

              MD5

              60fe01df86be2e5331b0cdbe86165686

              SHA1

              2a79f9713c3f192862ff80508062e64e8e0b29bd

              SHA256

              c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

              SHA512

              ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

              Filesize

              300B

              MD5

              dec6bbe308eb44937f77160a25ee32db

              SHA1

              8f08a4b641b564b67205e00106ca6bd9ca46fc6e

              SHA256

              68a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e

              SHA512

              6c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

              Filesize

              192B

              MD5

              397c3874d49c758a2d7d4158524d2764

              SHA1

              bb614c5a0de0aef498c2e3aa351b694079572fb4

              SHA256

              8a2c0e5ab0c065ab51d0b54f3ab0e4c0c7586a1584f0b2b36c48cf2b69845528

              SHA512

              75ff3d7dd92eb85b834ca3e5020be9b9bb5e26f133db66ae0f7fdc33f2ee6a1af19b2cc8be1be648bfb43ac25b9622e5f1d6d3ae865bcb354e31170cc6b3df4e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

              Filesize

              192B

              MD5

              168c2115ce62417b925ee100340a5db3

              SHA1

              eeb2174f78f732545158883b60fc5a74e688156a

              SHA256

              76b173183720845215854ff78a9dec27abfda09633ffcf053dd6235f56c61f50

              SHA512

              d19d14fb94b1c0c505d8bbbe514940af68dab071776289d2e577994cbda3f539bbbc3389f0b7658122c7542cdb0bf77a23e1f6957665e2bc398e0b8fb910d91a

            • C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • C:\Users\Admin\AppData\Local\Microsoft\@2RLl.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • C:\Users\Admin\Documents\Bandicam\dllhost.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • C:\Users\Admin\Documents\Bandicam\dllhost.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • C:\Users\Admin\Documents\Bandicam\dllhost.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • C:\Users\Admin\Documents\Bandicam\dllhost.exe

              Filesize

              228KB

              MD5

              0149c8c0b3f822a07b229b0adc505f0f

              SHA1

              6eee43488d721b374adabc4243e647d59244f38e

              SHA256

              e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

              SHA512

              207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

            • memory/1416-195-0x0000000000400000-0x00000000004AF000-memory.dmp

              Filesize

              700KB

            • memory/1640-159-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-162-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-153-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-154-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-155-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-157-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-158-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-149-0x00000221D02C0000-0x00000221D02C3000-memory.dmp

              Filesize

              12KB

            • memory/1640-160-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-161-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-139-0x00000221D02C0000-0x00000221D02C3000-memory.dmp

              Filesize

              12KB

            • memory/1640-151-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/1640-150-0x00000221D0420000-0x00000221D0427000-memory.dmp

              Filesize

              28KB

            • memory/1640-152-0x00007FF41E290000-0x00007FF41E3BD000-memory.dmp

              Filesize

              1.2MB

            • memory/3236-186-0x0000000000400000-0x00000000004AF000-memory.dmp

              Filesize

              700KB

            • memory/3800-167-0x0000000000600000-0x0000000000606000-memory.dmp

              Filesize

              24KB

            • memory/3800-179-0x0000000000400000-0x00000000004AF000-memory.dmp

              Filesize

              700KB

            • memory/4616-146-0x00000000031F0000-0x0000000003226000-memory.dmp

              Filesize

              216KB

            • memory/4616-140-0x00000000031F0000-0x0000000003226000-memory.dmp

              Filesize

              216KB

            • memory/4616-148-0x0000000000400000-0x00000000004E6000-memory.dmp

              Filesize

              920KB

            • memory/4616-138-0x0000000000400000-0x00000000004E6000-memory.dmp

              Filesize

              920KB

            • memory/4616-137-0x00000000023F0000-0x00000000027F0000-memory.dmp

              Filesize

              4.0MB

            • memory/4616-134-0x0000000002140000-0x00000000021B1000-memory.dmp

              Filesize

              452KB

            • memory/4616-136-0x00000000023F0000-0x00000000027F0000-memory.dmp

              Filesize

              4.0MB

            • memory/4616-135-0x00000000005A0000-0x00000000005A7000-memory.dmp

              Filesize

              28KB

            • memory/4824-187-0x0000000000400000-0x00000000004AF000-memory.dmp

              Filesize

              700KB