Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2023 14:59

General

  • Target

    file.exe

  • Size

    447KB

  • MD5

    c6370fd9fec5500a8eb3a0c6a7cb9999

  • SHA1

    ce87cba0d983f1d85e3a65a0351b4b5d15da31b4

  • SHA256

    6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297

  • SHA512

    0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774

  • SSDEEP

    6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU

Malware Config

Extracted

Family

colibri

Version

1.4.1

Botnet

bot

C2

http://oraycdn.com/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1204
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Deletes itself
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:516
    • C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]
      "C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\schtasks.exe
        /create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
        2⤵
        • Creates scheduled task(s)
        PID:740
      • C:\Users\Admin\Documents\Bandicam\dllhost.exe
        "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
        2⤵
        • Executes dropped EXE
        PID:1692
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {83D4034D-E116-4271-A54C-B682C8CBAD5C} S-1-5-21-2961826002-3968192592-354541192-1000:HVMHZIYD\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\Documents\Bandicam\dllhost.exe
        C:\Users\Admin\Documents\Bandicam\dllhost.exe
        2⤵
        • Executes dropped EXE
        PID:428

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      60fe01df86be2e5331b0cdbe86165686

      SHA1

      2a79f9713c3f192862ff80508062e64e8e0b29bd

      SHA256

      c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

      SHA512

      ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      300B

      MD5

      dec6bbe308eb44937f77160a25ee32db

      SHA1

      8f08a4b641b564b67205e00106ca6bd9ca46fc6e

      SHA256

      68a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e

      SHA512

      6c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      02d6f5594dcb078377ed6de4a314fe6f

      SHA1

      2c0f76d04848e2b2eb421ccdfc85b9d52c34d90d

      SHA256

      54e2cad2772d3655d738ddd70e8f34cf3661fb907cd67e1ce2a2256f14fa6099

      SHA512

      2054c2771ef90909d02e00dae46c6708606cca79ecce7a4cc6c7f9d01a43c8c46739e17f89f318bd9dafacc348e957e9d18f923faed51bcd23efab200c8d1b7b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      192B

      MD5

      078a1a93b062ceb9d461e32db9465cec

      SHA1

      486496b99b4042ef70dd0690bf464ff8b9c9be07

      SHA256

      db532c1fdd69672f5085d0c60a5a8e454492d98c21a257092bd0206abd9422d8

      SHA512

      19c34290c08e1b2b285d8e1a697dbd5c912ead3908d9fdadc00f857c2e6d184b102e79e0b43392fbbeb998d806d935e02460e9176ce700f6edf49c7e7861e2b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c50ba9e0cbdd87b9b3cc3eb32837cca6

      SHA1

      2bd56df09f70a2203cfa64cf3b8c2443c6f9749e

      SHA256

      998cf4f6556ef9391199dc55056fd212d31776439a71268d500e41c65968bf90

      SHA512

      823836cef2e58d7ac278a9f85ab5a00c45a8d30b89c9160732b9aebd3afeb9cb720016dd4067babe47835a04dc4b31187e7b92b822b764cb33d0a54d11f7116c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      26efb0b49b70813340ee6c575b9fa9a4

      SHA1

      ac29a8249c42d47ecb28838490591bdf2caa2457

      SHA256

      7bbd9b2a6778c43c725263be08a56ea8a3071ef8837c099364ab6e0c3b96c330

      SHA512

      d3b9f8e1fc006913ec75416f7b182b638311b4c2836391b5521bb2df8eceb374ff5cd3fb4f08be812f98369028183fcfeb7e78d1f007e5123e0b36139a6d5348

    • C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\AppData\Local\Temp\CabFCD8.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarD5.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • C:\Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • \Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • \Users\Admin\Documents\Bandicam\dllhost.exe

      Filesize

      228KB

      MD5

      0149c8c0b3f822a07b229b0adc505f0f

      SHA1

      6eee43488d721b374adabc4243e647d59244f38e

      SHA256

      e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

      SHA512

      207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

    • memory/428-251-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/516-60-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/516-76-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-83-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-72-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-75-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-73-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-71-0x0000000000130000-0x0000000000137000-memory.dmp

      Filesize

      28KB

    • memory/516-79-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-70-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/516-78-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-82-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-81-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-74-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/516-80-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/1204-59-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/1204-55-0x0000000000220000-0x0000000000291000-memory.dmp

      Filesize

      452KB

    • memory/1204-61-0x0000000001FF0000-0x0000000002026000-memory.dmp

      Filesize

      216KB

    • memory/1204-67-0x0000000001FF0000-0x0000000002026000-memory.dmp

      Filesize

      216KB

    • memory/1204-57-0x00000000020A0000-0x00000000024A0000-memory.dmp

      Filesize

      4.0MB

    • memory/1204-58-0x00000000020A0000-0x00000000024A0000-memory.dmp

      Filesize

      4.0MB

    • memory/1204-56-0x00000000002B0000-0x00000000002B7000-memory.dmp

      Filesize

      28KB

    • memory/1204-69-0x0000000000400000-0x00000000004E6000-memory.dmp

      Filesize

      920KB

    • memory/1400-192-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1400-116-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1400-87-0x0000000000220000-0x0000000000226000-memory.dmp

      Filesize

      24KB

    • memory/1692-194-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB

    • memory/1692-246-0x0000000000400000-0x00000000004AF000-memory.dmp

      Filesize

      700KB