Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 07:31

General

  • Target

    colorbot.rar

  • Size

    54.3MB

  • MD5

    321f4ef1c593c76502ad73da3628776c

  • SHA1

    f4b502edaa1a1167237eb878f536dbcd392ae11b

  • SHA256

    8a0cd0d9e7eb2ff12107ac3e78acc36e7065a82650b32557ceabb67c86c760ec

  • SHA512

    22d370b82749529650e31f8bf9ab81a1bcc776022b574be17b58dd408f3b0404c1f8a54a6fa1fe5c59d13167abc20356f7e89d4deb47755a04ea62a2d5e441d1

  • SSDEEP

    1572864:7OHCTKkfv2a1dEsMDN7kJX3Rj702cePqXBt/jN:aOKkfeaT07kJxFW3Z

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\colorbot.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\colorbot.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\colorbot.rar
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\colorbot.rar"
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2276
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RestartUnblock.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

    Filesize

    84B

    MD5

    d7396513471e23a9e0449b9c52c2f976

    SHA1

    783b4b0c357bcf2a3a08c601c6e33648a4cc522b

    SHA256

    3777fa7e19dd76560c61cb59c46aaff7890b1492fd036079e3d97f8b65cbf316

    SHA512

    bb557b28945fd61635282c8edb5d9661a37a3e529728b045fdca69a957008ae19567dd5fcec6ebf625eda6039ca5bf73eaf899e80f8d40aaba33b385f0af22d1

  • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock

    Filesize

    18B

    MD5

    5fee5b748dbed8be8198b20781fa6109

    SHA1

    25cb614afef1d3482806d6915fa5395386b533f4

    SHA256

    db53e12482fc1730374235b4216f87dec5cf7729b56be7d7f7eab38437eec6b0

    SHA512

    b84e3c2cc0cb1892e7fd9012ea7dbc7354998ce7cfd6da48ee86741bff0094175129581ab58e333b0abe431fd54d50c7bbab0caa4f31970d0f9024720ab63608

  • memory/2276-54-0x000007FEF54A0000-0x000007FEF54D4000-memory.dmp

    Filesize

    208KB

  • memory/2276-53-0x000000013F280000-0x000000013F378000-memory.dmp

    Filesize

    992KB

  • memory/2276-56-0x000007FEF6BC0000-0x000007FEF6BD8000-memory.dmp

    Filesize

    96KB

  • memory/2276-57-0x000007FEF6650000-0x000007FEF6667000-memory.dmp

    Filesize

    92KB

  • memory/2276-58-0x000007FEF5090000-0x000007FEF50A1000-memory.dmp

    Filesize

    68KB

  • memory/2276-59-0x000007FEF5070000-0x000007FEF5087000-memory.dmp

    Filesize

    92KB

  • memory/2276-60-0x000007FEF5050000-0x000007FEF5061000-memory.dmp

    Filesize

    68KB

  • memory/2276-61-0x000007FEF5030000-0x000007FEF504D000-memory.dmp

    Filesize

    116KB

  • memory/2276-62-0x000007FEF5010000-0x000007FEF5021000-memory.dmp

    Filesize

    68KB

  • memory/2276-55-0x000007FEF51E0000-0x000007FEF5496000-memory.dmp

    Filesize

    2.7MB

  • memory/2276-64-0x000007FEF3D50000-0x000007FEF3F5B000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-75-0x000007FEF3B50000-0x000007FEF3BB7000-memory.dmp

    Filesize

    412KB

  • memory/2276-63-0x000007FEF3F60000-0x000007FEF5010000-memory.dmp

    Filesize

    16.7MB

  • memory/2276-78-0x000007FEF3A50000-0x000007FEF3AA7000-memory.dmp

    Filesize

    348KB

  • memory/2276-77-0x000007FEF3AB0000-0x000007FEF3AC1000-memory.dmp

    Filesize

    68KB

  • memory/2276-79-0x000007FEF3A20000-0x000007FEF3A48000-memory.dmp

    Filesize

    160KB

  • memory/2276-76-0x000007FEF3AD0000-0x000007FEF3B4C000-memory.dmp

    Filesize

    496KB

  • memory/2276-80-0x000007FEF39F0000-0x000007FEF3A14000-memory.dmp

    Filesize

    144KB

  • memory/2276-81-0x000007FEF39D0000-0x000007FEF39E8000-memory.dmp

    Filesize

    96KB

  • memory/2276-82-0x000007FEF39A0000-0x000007FEF39C3000-memory.dmp

    Filesize

    140KB

  • memory/2276-83-0x000007FEF3980000-0x000007FEF3991000-memory.dmp

    Filesize

    68KB

  • memory/2276-74-0x000007FEF3BC0000-0x000007FEF3BF0000-memory.dmp

    Filesize

    192KB

  • memory/2276-84-0x000007FEF3960000-0x000007FEF3972000-memory.dmp

    Filesize

    72KB

  • memory/2276-73-0x000007FEF3BF0000-0x000007FEF3C08000-memory.dmp

    Filesize

    96KB

  • memory/2276-72-0x000007FEF3C10000-0x000007FEF3C21000-memory.dmp

    Filesize

    68KB

  • memory/2276-71-0x000007FEF3C30000-0x000007FEF3C4B000-memory.dmp

    Filesize

    108KB

  • memory/2276-70-0x000007FEF3C50000-0x000007FEF3C61000-memory.dmp

    Filesize

    68KB

  • memory/2276-69-0x000007FEF3C70000-0x000007FEF3C81000-memory.dmp

    Filesize

    68KB

  • memory/2276-68-0x000007FEF3C90000-0x000007FEF3CA1000-memory.dmp

    Filesize

    68KB

  • memory/2276-67-0x000007FEF3CB0000-0x000007FEF3CC8000-memory.dmp

    Filesize

    96KB

  • memory/2276-66-0x000007FEF3CD0000-0x000007FEF3CF1000-memory.dmp

    Filesize

    132KB

  • memory/2276-65-0x000007FEF3D00000-0x000007FEF3D41000-memory.dmp

    Filesize

    260KB

  • memory/2276-97-0x000007FEF51E0000-0x000007FEF5496000-memory.dmp

    Filesize

    2.7MB

  • memory/2276-96-0x000007FEF54A0000-0x000007FEF54D4000-memory.dmp

    Filesize

    208KB

  • memory/2276-98-0x000007FEF3F60000-0x000007FEF5010000-memory.dmp

    Filesize

    16.7MB

  • memory/2276-95-0x000000013F280000-0x000000013F378000-memory.dmp

    Filesize

    992KB