Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
447KB
-
MD5
c6370fd9fec5500a8eb3a0c6a7cb9999
-
SHA1
ce87cba0d983f1d85e3a65a0351b4b5d15da31b4
-
SHA256
6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297
-
SHA512
0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774
-
SSDEEP
6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU
Malware Config
Extracted
colibri
1.4.1
bot
http://oraycdn.com/gate.php
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1132 created 3116 1132 file.exe 50 -
Executes dropped EXE 3 IoCs
pid Process 2392 giXgg8$xKW.exe 4660 dllhost.exe 8 dllhost.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1356 1132 WerFault.exe 82 3404 2392 WerFault.exe 94 872 8 WerFault.exe 99 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1132 file.exe 1132 file.exe 1132 file.exe 1132 file.exe 3944 certreq.exe 3944 certreq.exe 3944 certreq.exe 3944 certreq.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3944 1132 file.exe 83 PID 1132 wrote to memory of 3944 1132 file.exe 83 PID 1132 wrote to memory of 3944 1132 file.exe 83 PID 1132 wrote to memory of 3944 1132 file.exe 83 PID 2392 wrote to memory of 2808 2392 giXgg8$xKW.exe 95 PID 2392 wrote to memory of 2808 2392 giXgg8$xKW.exe 95 PID 2392 wrote to memory of 2808 2392 giXgg8$xKW.exe 95 PID 2392 wrote to memory of 4660 2392 giXgg8$xKW.exe 96 PID 2392 wrote to memory of 4660 2392 giXgg8$xKW.exe 96 PID 2392 wrote to memory of 4660 2392 giXgg8$xKW.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 8003⤵
- Program crash
PID:1356
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1132 -ip 11321⤵PID:3600
-
C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe"C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exe/create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Creates scheduled task(s)
PID:2808
-
-
C:\Users\Admin\Documents\Bandicam\dllhost.exe"C:\Users\Admin\Documents\Bandicam\dllhost.exe"2⤵
- Executes dropped EXE
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 15962⤵
- Program crash
PID:3404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2392 -ip 23921⤵PID:4464
-
C:\Users\Admin\Documents\Bandicam\dllhost.exeC:\Users\Admin\Documents\Bandicam\dllhost.exe1⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 3522⤵
- Program crash
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8 -ip 81⤵PID:392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
300B
MD5dec6bbe308eb44937f77160a25ee32db
SHA18f08a4b641b564b67205e00106ca6bd9ca46fc6e
SHA25668a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e
SHA5126c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD57a4199e52a12b36258115b774eb981c0
SHA19d537f806b2070397783a02357302e1e564283de
SHA2564a28d176cf636f5683c1dc7c205a07681b6c50024c78a79b25d59a6e7998c607
SHA5129773624ae1b07dffe337e6c5b92308434490964f112461150049f85d9683998167d9b4ac93a84f80118b20b78a2e062bc7aa5489c872343e3ca539da556c55b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD5c71dd046c83be0d9571b5f983e0b4f92
SHA1b848caf98e7a0e25017e12af7692db4d08d26e36
SHA25647e3fb2c95fcaeca324ed7a4a7e5de83cb06f2097aff0ad38bab11be65a35f1d
SHA51290e6beb88e043940f4401fbe6deefacad01c2d4d4e74378742c11e93c23fd00de05c301851671fc1d6a7625b22f65a07bcb8f36bbd30ff49ac746579d0862334
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9
-
Filesize
228KB
MD50149c8c0b3f822a07b229b0adc505f0f
SHA16eee43488d721b374adabc4243e647d59244f38e
SHA256e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c
SHA512207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9