Overview
overview
7Static
static
3colorbot.rar
windows7-x64
3colorbot.rar
windows10-2004-x64
3colorbot/a...ce.exe
windows7-x64
7colorbot/a...ce.exe
windows10-2004-x64
7aimsource.pyc
windows7-x64
3aimsource.pyc
windows10-2004-x64
3colorbot/config.txt
windows7-x64
1colorbot/config.txt
windows10-2004-x64
1colorbot/k...st.txt
windows7-x64
1colorbot/k...st.txt
windows10-2004-x64
1colorbot/l...ch.txt
windows7-x64
1colorbot/l...ch.txt
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 07:31
Behavioral task
behavioral1
Sample
colorbot.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
colorbot.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
colorbot/aimsource.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
colorbot/aimsource.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
aimsource.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
aimsource.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
colorbot/config.txt
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
colorbot/config.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
colorbot/keybind_list.txt
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
colorbot/keybind_list.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
colorbot/lastlaunch.txt
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
colorbot/lastlaunch.txt
Resource
win10v2004-20240508-en
General
-
Target
colorbot.rar
-
Size
54.3MB
-
MD5
321f4ef1c593c76502ad73da3628776c
-
SHA1
f4b502edaa1a1167237eb878f536dbcd392ae11b
-
SHA256
8a0cd0d9e7eb2ff12107ac3e78acc36e7065a82650b32557ceabb67c86c760ec
-
SHA512
22d370b82749529650e31f8bf9ab81a1bcc776022b574be17b58dd408f3b0404c1f8a54a6fa1fe5c59d13167abc20356f7e89d4deb47755a04ea62a2d5e441d1
-
SSDEEP
1572864:7OHCTKkfv2a1dEsMDN7kJX3Rj702cePqXBt/jN:aOKkfeaT07kJxFW3Z
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1852 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2276 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 vlc.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe 2276 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2756 2204 cmd.exe 29 PID 2204 wrote to memory of 2756 2204 cmd.exe 29 PID 2204 wrote to memory of 2756 2204 cmd.exe 29 PID 2756 wrote to memory of 2524 2756 rundll32.exe 30 PID 2756 wrote to memory of 2524 2756 rundll32.exe 30 PID 2756 wrote to memory of 2524 2756 rundll32.exe 30 PID 2524 wrote to memory of 2276 2524 rundll32.exe 32 PID 2524 wrote to memory of 2276 2524 rundll32.exe 32 PID 2524 wrote to memory of 2276 2524 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\colorbot.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\colorbot.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\colorbot.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\colorbot.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RestartUnblock.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5d7396513471e23a9e0449b9c52c2f976
SHA1783b4b0c357bcf2a3a08c601c6e33648a4cc522b
SHA2563777fa7e19dd76560c61cb59c46aaff7890b1492fd036079e3d97f8b65cbf316
SHA512bb557b28945fd61635282c8edb5d9661a37a3e529728b045fdca69a957008ae19567dd5fcec6ebf625eda6039ca5bf73eaf899e80f8d40aaba33b385f0af22d1
-
Filesize
18B
MD55fee5b748dbed8be8198b20781fa6109
SHA125cb614afef1d3482806d6915fa5395386b533f4
SHA256db53e12482fc1730374235b4216f87dec5cf7729b56be7d7f7eab38437eec6b0
SHA512b84e3c2cc0cb1892e7fd9012ea7dbc7354998ce7cfd6da48ee86741bff0094175129581ab58e333b0abe431fd54d50c7bbab0caa4f31970d0f9024720ab63608