Overview
overview
10Static
static
7kolebot/da...er.exe
windows7-x64
7kolebot/da...er.exe
windows10-2004-x64
10kolebot/da...le.dll
windows7-x64
7kolebot/da...le.dll
windows10-2004-x64
10kolebot/dat/psapi.dll
windows7-x64
1kolebot/dat/psapi.dll
windows10-2004-x64
10kolebot/kole.exe
windows7-x64
7kolebot/kole.exe
windows10-2004-x64
10kolebot/we...ea.url
windows7-x64
6kolebot/we...ea.url
windows10-2004-x64
10kolebot/we...ot.url
windows7-x64
6kolebot/we...ot.url
windows10-2004-x64
10kolebot/we...le.url
windows7-x64
6kolebot/we...le.url
windows10-2004-x64
10Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
kolebot/dat/klauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
kolebot/dat/klauncher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
kolebot/dat/kmodule.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
kolebot/dat/kmodule.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
kolebot/dat/psapi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
kolebot/dat/psapi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
kolebot/kole.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kolebot/kole.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
kolebot/website/GameCrea.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
kolebot/website/GameCrea.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
kolebot/website/Kolebot.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
kolebot/website/Kolebot.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kolebot/website/OnlineHile.url
Resource
win7-20231129-en
General
-
Target
kolebot/dat/kmodule.dll
-
Size
3.0MB
-
MD5
7b58eeed2148d3a19110e7cac5c01237
-
SHA1
c314a9b08dd04cb370d756941e48ad2ebb9ade6d
-
SHA256
8b991944797c991a8e6362275abb6008cee8e1f014c5edc6627aa230ea8d5f8d
-
SHA512
472062d6ab0e7ff4f8870620b376eac0e29c9f4accd81ad8f5c74e8625283984df3eb99d52d07f6cc18f6790e76204cedea710dcd11730d54d70cff90e26db78
-
SSDEEP
98304:YgE2MvZYs03233IZ7pGS5NWrFvgGebQxHteiL9K/tXcm434ZTJ2aA1GzdfwWizwe:YgnMvZYs0Ps
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Wine rundll32.exe -
resource yara_rule behavioral4/memory/2656-0-0x0000000000400000-0x0000000000708000-memory.dmp themida behavioral4/memory/2656-3-0x0000000000400000-0x0000000000708000-memory.dmp themida -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3236 wrote to memory of 2656 3236 rundll32.exe 85 PID 3236 wrote to memory of 2656 3236 rundll32.exe 85 PID 3236 wrote to memory of 2656 3236 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\kolebot\dat\kmodule.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\kolebot\dat\kmodule.dll,#12⤵
- Identifies Wine through registry keys
PID:2656
-