Overview
overview
10Static
static
7kolebot/da...er.exe
windows7-x64
7kolebot/da...er.exe
windows10-2004-x64
10kolebot/da...le.dll
windows7-x64
7kolebot/da...le.dll
windows10-2004-x64
10kolebot/dat/psapi.dll
windows7-x64
1kolebot/dat/psapi.dll
windows10-2004-x64
10kolebot/kole.exe
windows7-x64
7kolebot/kole.exe
windows10-2004-x64
10kolebot/we...ea.url
windows7-x64
6kolebot/we...ea.url
windows10-2004-x64
10kolebot/we...ot.url
windows7-x64
6kolebot/we...ot.url
windows10-2004-x64
10kolebot/we...le.url
windows7-x64
6kolebot/we...le.url
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
kolebot/dat/klauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
kolebot/dat/klauncher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
kolebot/dat/kmodule.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
kolebot/dat/kmodule.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
kolebot/dat/psapi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
kolebot/dat/psapi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
kolebot/kole.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kolebot/kole.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
kolebot/website/GameCrea.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
kolebot/website/GameCrea.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
kolebot/website/Kolebot.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
kolebot/website/Kolebot.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kolebot/website/OnlineHile.url
Resource
win7-20231129-en
General
-
Target
kolebot/kole.exe
-
Size
685KB
-
MD5
2d61c397d1105adfa9f24d6f2ed009c6
-
SHA1
955348a31c60572f8c31ff4cf056af71e3839073
-
SHA256
4d9b6f7cb5e033213affe7e043472e2b8394dbbef07a974396fae31b1211a171
-
SHA512
466789f02850a611d23eaeb4c0fe6d3ff007e77b6997f22c3119140b7595bb15e1bdd883d6d9dd6d545d7f096173e4ca472e2c053c0f47c2a4b67a6a1c20c2bf
-
SSDEEP
12288:vzf39vubuTqaEZZpZGNZyXPZXCHEJvx2pqrq6GQ16ZSv/a0rT888888888888W8n:vT39vu6TmbZeZM1CMmoz64HKnBg
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Wine klauncher.dat -
resource yara_rule behavioral8/memory/1440-2-0x0000000000400000-0x000000000059C000-memory.dmp themida behavioral8/memory/1440-3-0x0000000000400000-0x000000000059C000-memory.dmp themida -
Program crash 2 IoCs
pid pid_target Process procid_target 4436 1440 WerFault.exe 90 4876 1440 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 1440 408 kole.exe 90 PID 408 wrote to memory of 1440 408 kole.exe 90 PID 408 wrote to memory of 1440 408 kole.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\kolebot\kole.exe"C:\Users\Admin\AppData\Local\Temp\kolebot\kole.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\kolebot\dat\klauncher.datkole2⤵
- Identifies Wine through registry keys
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 2563⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 3243⤵
- Program crash
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 1440 -ip 14401⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1440 -ip 14401⤵PID:3588