Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-06-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
447KB
-
MD5
c6370fd9fec5500a8eb3a0c6a7cb9999
-
SHA1
ce87cba0d983f1d85e3a65a0351b4b5d15da31b4
-
SHA256
6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297
-
SHA512
0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774
-
SSDEEP
6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU
Malware Config
Extracted
colibri
1.4.1
bot
http://oraycdn.com/gate.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1204 created 1232 1204 file.exe 14 -
Deletes itself 1 IoCs
pid Process 516 certreq.exe -
Executes dropped EXE 3 IoCs
pid Process 1400 pKX][email protected] 1692 dllhost.exe 428 dllhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1400 pKX][email protected] 1400 pKX][email protected] -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 740 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 pKX][email protected] Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 pKX][email protected] Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 pKX][email protected] Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 pKX][email protected] -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1204 file.exe 1204 file.exe 1204 file.exe 1204 file.exe 516 certreq.exe 516 certreq.exe 516 certreq.exe 516 certreq.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1204 wrote to memory of 516 1204 file.exe 28 PID 1400 wrote to memory of 740 1400 pKX][email protected] 33 PID 1400 wrote to memory of 740 1400 pKX][email protected] 33 PID 1400 wrote to memory of 740 1400 pKX][email protected] 33 PID 1400 wrote to memory of 740 1400 pKX][email protected] 33 PID 1400 wrote to memory of 1692 1400 pKX][email protected] 34 PID 1400 wrote to memory of 1692 1400 pKX][email protected] 34 PID 1400 wrote to memory of 1692 1400 pKX][email protected] 34 PID 1400 wrote to memory of 1692 1400 pKX][email protected] 34 PID 1764 wrote to memory of 428 1764 taskeng.exe 37 PID 1764 wrote to memory of 428 1764 taskeng.exe 37 PID 1764 wrote to memory of 428 1764 taskeng.exe 37 PID 1764 wrote to memory of 428 1764 taskeng.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:516
-
-
C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]"C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe/create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Creates scheduled task(s)
PID:740
-
-
C:\Users\Admin\Documents\Bandicam\dllhost.exe"C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {83D4034D-E116-4271-A54C-B682C8CBAD5C} S-1-5-21-2961826002-3968192592-354541192-1000:HVMHZIYD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\Documents\Bandicam\dllhost.exeC:\Users\Admin\Documents\Bandicam\dllhost.exe2⤵
- Executes dropped EXE
PID:428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
300B
MD5dec6bbe308eb44937f77160a25ee32db
SHA18f08a4b641b564b67205e00106ca6bd9ca46fc6e
SHA25668a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e
SHA5126c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD502d6f5594dcb078377ed6de4a314fe6f
SHA12c0f76d04848e2b2eb421ccdfc85b9d52c34d90d
SHA25654e2cad2772d3655d738ddd70e8f34cf3661fb907cd67e1ce2a2256f14fa6099
SHA5122054c2771ef90909d02e00dae46c6708606cca79ecce7a4cc6c7f9d01a43c8c46739e17f89f318bd9dafacc348e957e9d18f923faed51bcd23efab200c8d1b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD5078a1a93b062ceb9d461e32db9465cec
SHA1486496b99b4042ef70dd0690bf464ff8b9c9be07
SHA256db532c1fdd69672f5085d0c60a5a8e454492d98c21a257092bd0206abd9422d8
SHA51219c34290c08e1b2b285d8e1a697dbd5c912ead3908d9fdadc00f857c2e6d184b102e79e0b43392fbbeb998d806d935e02460e9176ce700f6edf49c7e7861e2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c50ba9e0cbdd87b9b3cc3eb32837cca6
SHA12bd56df09f70a2203cfa64cf3b8c2443c6f9749e
SHA256998cf4f6556ef9391199dc55056fd212d31776439a71268d500e41c65968bf90
SHA512823836cef2e58d7ac278a9f85ab5a00c45a8d30b89c9160732b9aebd3afeb9cb720016dd4067babe47835a04dc4b31187e7b92b822b764cb33d0a54d11f7116c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526efb0b49b70813340ee6c575b9fa9a4
SHA1ac29a8249c42d47ecb28838490591bdf2caa2457
SHA2567bbd9b2a6778c43c725263be08a56ea8a3071ef8837c099364ab6e0c3b96c330
SHA512d3b9f8e1fc006913ec75416f7b182b638311b4c2836391b5521bb2df8eceb374ff5cd3fb4f08be812f98369028183fcfeb7e78d1f007e5123e0b36139a6d5348
-
C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]
Filesize228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
C:\Users\Admin\AppData\Local\Microsoft\pKX][email protected]
Filesize228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9