Overview
overview
10Static
static
7kolebot/da...er.exe
windows7-x64
7kolebot/da...er.exe
windows10-2004-x64
10kolebot/da...le.dll
windows7-x64
7kolebot/da...le.dll
windows10-2004-x64
10kolebot/dat/psapi.dll
windows7-x64
1kolebot/dat/psapi.dll
windows10-2004-x64
10kolebot/kole.exe
windows7-x64
7kolebot/kole.exe
windows10-2004-x64
10kolebot/we...ea.url
windows7-x64
6kolebot/we...ea.url
windows10-2004-x64
10kolebot/we...ot.url
windows7-x64
6kolebot/we...ot.url
windows10-2004-x64
10kolebot/we...le.url
windows7-x64
6kolebot/we...le.url
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
kolebot/dat/klauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
kolebot/dat/klauncher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
kolebot/dat/kmodule.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
kolebot/dat/kmodule.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
kolebot/dat/psapi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
kolebot/dat/psapi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
kolebot/kole.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kolebot/kole.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
kolebot/website/GameCrea.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
kolebot/website/GameCrea.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
kolebot/website/Kolebot.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
kolebot/website/Kolebot.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kolebot/website/OnlineHile.url
Resource
win7-20231129-en
General
-
Target
kolebot/website/Kolebot.url
-
Size
122B
-
MD5
9e5ae6d61f4580eeb1ff706dea9c981d
-
SHA1
a2246358d309971f65c2a92ceaf649959d5e1668
-
SHA256
770a6f046fab3b2195214e551a4f3f010684f2c74080a43fb253b2cbf1e59679
-
SHA512
dcf7cd1ff3a9b565bd6d05dbd00cc34446cf31120556b24f1d6cf543658f44f4312d35398591e8d0f464e7fc898eacdc589ba525f79040ca65551489d804a565
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 3032 msedge.exe 3032 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 3032 2244 rundll32.exe 87 PID 2244 wrote to memory of 3032 2244 rundll32.exe 87 PID 3032 wrote to memory of 3116 3032 msedge.exe 89 PID 3032 wrote to memory of 3116 3032 msedge.exe 89 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 4232 3032 msedge.exe 92 PID 3032 wrote to memory of 3284 3032 msedge.exe 91 PID 3032 wrote to memory of 3284 3032 msedge.exe 91 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93 PID 3032 wrote to memory of 3272 3032 msedge.exe 93
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\kolebot\website\Kolebot.url1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.kolebot.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0d6046f8,0x7ffa0d604708,0x7ffa0d6047183⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:23⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:83⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:13⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:13⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:83⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:13⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:13⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:13⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,403702509169546004,10884972685726437774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
Filesize
473B
MD5a7e2975bc4de7aa4b3a42c0560e858db
SHA154780606b9d1ef5028c149acef1947f34b6043d4
SHA256d1245dba22ed2dc007e877406efdbfd75770fdd41577803ed137843365df103c
SHA5123390ac70bf3eae5785aaf8800221af1b9162fd215d4bf71f8390a256d0aa0802dc79e05b4102e3c3d8ae88308d483d7f066becf4f18431617fb5250edeb5b48e
-
Filesize
5KB
MD5ff7bb631ff98009f028da373f552bbda
SHA1ad3d0cb523997eb21997d84047088455ae8d73aa
SHA256ebb528da38dc7059ef94acd26d2a9b44e20625d063f1613e53a24ac797385b42
SHA512164bbbe7c78b5e70c5135b25d741342fa9b22f38c2afba9afa0609a867247bef05da4b7adc631addd76ac6c6a06d4d84a5d135147ba4acd660ff6fc116024dab
-
Filesize
5KB
MD54604d65715892c2e60270bf7acc5ee2c
SHA1aefe34e2e1e374b3d9042a6adcb948751aa990d2
SHA256e2523ae113bf022b439eb4b437984888938618b0aff9b6994dfc3846a33da212
SHA512943b2a3e69d69f88fc229e1966e421cbb5904be66cb25c596265da2ea20f04d5beb5fc68177f44f542b6708d9931664c4cd98ff15620d110becd4536253d6d81
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD566ff3e20d17944e7b97d87ad44e5625d
SHA118566e6fe4d2d94d91746206d1f93603a8e0c808
SHA25659f392566a6bfb0db63233270007006f3a98d48a67b40daf38f66fabdf3ff746
SHA51202c9411d0d64382f7f39ee9c4ea3d216b258fe0ee1bc1805aa41f8a88a1be77dc468a24bc35982555df3a56cbb9412f2da817601ebd785f6c96d1a53827df2c2