Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 07:31

General

  • Target

    colorbot.rar

  • Size

    54.3MB

  • MD5

    321f4ef1c593c76502ad73da3628776c

  • SHA1

    f4b502edaa1a1167237eb878f536dbcd392ae11b

  • SHA256

    8a0cd0d9e7eb2ff12107ac3e78acc36e7065a82650b32557ceabb67c86c760ec

  • SHA512

    22d370b82749529650e31f8bf9ab81a1bcc776022b574be17b58dd408f3b0404c1f8a54a6fa1fe5c59d13167abc20356f7e89d4deb47755a04ea62a2d5e441d1

  • SSDEEP

    1572864:7OHCTKkfv2a1dEsMDN7kJX3Rj702cePqXBt/jN:aOKkfeaT07kJxFW3Z

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\colorbot.rar
    1⤵
    • Modifies registry class
    PID:4644
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3416
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4996 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:788
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\GetSend.ods"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3480-6-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-8-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-7-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-9-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-10-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-11-0x00007FFE36AF0000-0x00007FFE36B00000-memory.dmp

    Filesize

    64KB

  • memory/3480-12-0x00007FFE36AF0000-0x00007FFE36B00000-memory.dmp

    Filesize

    64KB

  • memory/3480-34-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-35-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-37-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB

  • memory/3480-36-0x00007FFE38E10000-0x00007FFE38E20000-memory.dmp

    Filesize

    64KB