Overview
overview
10Static
static
7kolebot/da...er.exe
windows7-x64
7kolebot/da...er.exe
windows10-2004-x64
10kolebot/da...le.dll
windows7-x64
7kolebot/da...le.dll
windows10-2004-x64
10kolebot/dat/psapi.dll
windows7-x64
1kolebot/dat/psapi.dll
windows10-2004-x64
10kolebot/kole.exe
windows7-x64
7kolebot/kole.exe
windows10-2004-x64
10kolebot/we...ea.url
windows7-x64
6kolebot/we...ea.url
windows10-2004-x64
10kolebot/we...ot.url
windows7-x64
6kolebot/we...ot.url
windows10-2004-x64
10kolebot/we...le.url
windows7-x64
6kolebot/we...le.url
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
kolebot/dat/klauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
kolebot/dat/klauncher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
kolebot/dat/kmodule.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
kolebot/dat/kmodule.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
kolebot/dat/psapi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
kolebot/dat/psapi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
kolebot/kole.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kolebot/kole.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
kolebot/website/GameCrea.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
kolebot/website/GameCrea.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
kolebot/website/Kolebot.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
kolebot/website/Kolebot.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kolebot/website/OnlineHile.url
Resource
win7-20231129-en
General
-
Target
kolebot/kole.exe
-
Size
685KB
-
MD5
2d61c397d1105adfa9f24d6f2ed009c6
-
SHA1
955348a31c60572f8c31ff4cf056af71e3839073
-
SHA256
4d9b6f7cb5e033213affe7e043472e2b8394dbbef07a974396fae31b1211a171
-
SHA512
466789f02850a611d23eaeb4c0fe6d3ff007e77b6997f22c3119140b7595bb15e1bdd883d6d9dd6d545d7f096173e4ca472e2c053c0f47c2a4b67a6a1c20c2bf
-
SSDEEP
12288:vzf39vubuTqaEZZpZGNZyXPZXCHEJvx2pqrq6GQ16ZSv/a0rT888888888888W8n:vT39vu6TmbZeZM1CMmoz64HKnBg
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
klauncher.datdescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Wine klauncher.dat -
Processes:
resource yara_rule behavioral7/memory/2120-3-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-4-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-42-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-43-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-44-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-46-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-47-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-48-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-49-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-50-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-51-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-52-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-53-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-54-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-55-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-56-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral7/memory/2120-57-0x0000000000400000-0x000000000059C000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
klauncher.datpid Process 2120 klauncher.dat -
Processes:
klauncher.datdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main klauncher.dat -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
klauncher.datpid Process 2120 klauncher.dat -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
klauncher.datpid Process 2120 klauncher.dat 2120 klauncher.dat -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
kole.exedescription pid Process procid_target PID 1380 wrote to memory of 2120 1380 kole.exe 28 PID 1380 wrote to memory of 2120 1380 kole.exe 28 PID 1380 wrote to memory of 2120 1380 kole.exe 28 PID 1380 wrote to memory of 2120 1380 kole.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\kolebot\kole.exe"C:\Users\Admin\AppData\Local\Temp\kolebot\kole.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\kolebot\dat\klauncher.datkole2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2120
-