Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 14:59

General

  • Target

    file.exe

  • Size

    447KB

  • MD5

    c6370fd9fec5500a8eb3a0c6a7cb9999

  • SHA1

    ce87cba0d983f1d85e3a65a0351b4b5d15da31b4

  • SHA256

    6c4c03231ed003e73fd65691c5950ae75f352e8467a486ea3ae34307ba35c297

  • SHA512

    0c73a811203a65e5bdb3c0ff68beb4189d0410b6976331aaf97804d802eec7f31470c0b5d78443546d6ee69e856f9abc671875b3fca83d394e288370e586a774

  • SSDEEP

    6144:bHpSbEF2KIXm7atCYbzMrBsE10PF86tv77exdj0W8+E8INlWZWneknqi7oH:b4bEKWO4YMNmjvaj0MELNlkknqiU

Malware Config

Extracted

Family

colibri

Version

1.4.1

Botnet

bot

C2

http://oraycdn.com/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 800
          3⤵
          • Program crash
          PID:1356
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:3944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 1132 -ip 1132
      1⤵
        PID:3600
      • C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe
        "C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\schtasks.exe
          /create /tn Bandicam /st 00:00 /du 9999:59 /sc once /ri 1 /f /tr "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
          2⤵
          • Creates scheduled task(s)
          PID:2808
        • C:\Users\Admin\Documents\Bandicam\dllhost.exe
          "C:\Users\Admin\Documents\Bandicam\dllhost.exe"
          2⤵
          • Executes dropped EXE
          PID:4660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 1596
          2⤵
          • Program crash
          PID:3404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2392 -ip 2392
        1⤵
          PID:4464
        • C:\Users\Admin\Documents\Bandicam\dllhost.exe
          C:\Users\Admin\Documents\Bandicam\dllhost.exe
          1⤵
          • Executes dropped EXE
          PID:8
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 352
            2⤵
            • Program crash
            PID:872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 8 -ip 8
          1⤵
            PID:392

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            60fe01df86be2e5331b0cdbe86165686

            SHA1

            2a79f9713c3f192862ff80508062e64e8e0b29bd

            SHA256

            c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

            SHA512

            ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

            Filesize

            300B

            MD5

            dec6bbe308eb44937f77160a25ee32db

            SHA1

            8f08a4b641b564b67205e00106ca6bd9ca46fc6e

            SHA256

            68a71de28f488586c2b169f4652347e0a1fd632d48a6d6725393607bfa18bc7e

            SHA512

            6c2d684af52588cfd34a682337749b829c2336b34d6add7e8bd6e0c641862c26889617b4d6e9f298fd177b89527deb696c493a205ea8490bb8aee60090a68475

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            7a4199e52a12b36258115b774eb981c0

            SHA1

            9d537f806b2070397783a02357302e1e564283de

            SHA256

            4a28d176cf636f5683c1dc7c205a07681b6c50024c78a79b25d59a6e7998c607

            SHA512

            9773624ae1b07dffe337e6c5b92308434490964f112461150049f85d9683998167d9b4ac93a84f80118b20b78a2e062bc7aa5489c872343e3ca539da556c55b1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

            Filesize

            192B

            MD5

            c71dd046c83be0d9571b5f983e0b4f92

            SHA1

            b848caf98e7a0e25017e12af7692db4d08d26e36

            SHA256

            47e3fb2c95fcaeca324ed7a4a7e5de83cb06f2097aff0ad38bab11be65a35f1d

            SHA512

            90e6beb88e043940f4401fbe6deefacad01c2d4d4e74378742c11e93c23fd00de05c301851671fc1d6a7625b22f65a07bcb8f36bbd30ff49ac746579d0862334

          • C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe

            Filesize

            228KB

            MD5

            0149c8c0b3f822a07b229b0adc505f0f

            SHA1

            6eee43488d721b374adabc4243e647d59244f38e

            SHA256

            e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

            SHA512

            207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

          • C:\Users\Admin\AppData\Local\Microsoft\giXgg8$xKW.exe

            Filesize

            228KB

            MD5

            0149c8c0b3f822a07b229b0adc505f0f

            SHA1

            6eee43488d721b374adabc4243e647d59244f38e

            SHA256

            e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

            SHA512

            207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

          • C:\Users\Admin\Documents\Bandicam\dllhost.exe

            Filesize

            228KB

            MD5

            0149c8c0b3f822a07b229b0adc505f0f

            SHA1

            6eee43488d721b374adabc4243e647d59244f38e

            SHA256

            e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

            SHA512

            207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

          • C:\Users\Admin\Documents\Bandicam\dllhost.exe

            Filesize

            228KB

            MD5

            0149c8c0b3f822a07b229b0adc505f0f

            SHA1

            6eee43488d721b374adabc4243e647d59244f38e

            SHA256

            e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

            SHA512

            207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

          • C:\Users\Admin\Documents\Bandicam\dllhost.exe

            Filesize

            228KB

            MD5

            0149c8c0b3f822a07b229b0adc505f0f

            SHA1

            6eee43488d721b374adabc4243e647d59244f38e

            SHA256

            e114cd7d08b02c34f3612cade3bf5a9806fbb5eff4e0ee6d193799ce40b36d1c

            SHA512

            207dc2346c2e344dc1d6cdc068dae3a29dd377bd8b20ec5fc32c93916d8921362e7e55106110c150d6da4ce40313381f15e4c348d1b6af3e36cd2e4e43f80da9

          • memory/8-190-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/1132-138-0x0000000000400000-0x00000000004E6000-memory.dmp

            Filesize

            920KB

          • memory/1132-148-0x0000000000400000-0x00000000004E6000-memory.dmp

            Filesize

            920KB

          • memory/1132-146-0x00000000031B0000-0x00000000031E6000-memory.dmp

            Filesize

            216KB

          • memory/1132-140-0x00000000031B0000-0x00000000031E6000-memory.dmp

            Filesize

            216KB

          • memory/1132-137-0x00000000024B0000-0x00000000028B0000-memory.dmp

            Filesize

            4.0MB

          • memory/1132-136-0x00000000024B0000-0x00000000028B0000-memory.dmp

            Filesize

            4.0MB

          • memory/1132-134-0x0000000002180000-0x00000000021F1000-memory.dmp

            Filesize

            452KB

          • memory/1132-135-0x0000000000760000-0x0000000000767000-memory.dmp

            Filesize

            28KB

          • memory/2392-167-0x0000000000600000-0x0000000000606000-memory.dmp

            Filesize

            24KB

          • memory/2392-178-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB

          • memory/3944-158-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-153-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-159-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-160-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-157-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-155-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-162-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-161-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-154-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-152-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-151-0x00007FF488570000-0x00007FF48869D000-memory.dmp

            Filesize

            1.2MB

          • memory/3944-150-0x0000022E23460000-0x0000022E23467000-memory.dmp

            Filesize

            28KB

          • memory/3944-139-0x0000022E230E0000-0x0000022E230E3000-memory.dmp

            Filesize

            12KB

          • memory/3944-149-0x0000022E230E0000-0x0000022E230E3000-memory.dmp

            Filesize

            12KB

          • memory/4660-184-0x0000000000400000-0x00000000004AF000-memory.dmp

            Filesize

            700KB