Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 07:36

General

  • Target

    colorbot.rar

  • Size

    54.3MB

  • MD5

    321f4ef1c593c76502ad73da3628776c

  • SHA1

    f4b502edaa1a1167237eb878f536dbcd392ae11b

  • SHA256

    8a0cd0d9e7eb2ff12107ac3e78acc36e7065a82650b32557ceabb67c86c760ec

  • SHA512

    22d370b82749529650e31f8bf9ab81a1bcc776022b574be17b58dd408f3b0404c1f8a54a6fa1fe5c59d13167abc20356f7e89d4deb47755a04ea62a2d5e441d1

  • SSDEEP

    1572864:7OHCTKkfv2a1dEsMDN7kJX3Rj702cePqXBt/jN:aOKkfeaT07kJxFW3Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\colorbot.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\colorbot.rar"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Local\Temp\7zO84AB8A06\aimsource.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO84AB8A06\aimsource.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Users\Admin\AppData\Local\Temp\7zO84AB8A06\aimsource.exe
          "C:\Users\Admin\AppData\Local\Temp\7zO84AB8A06\aimsource.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2692
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO84AE2D66\lastlaunch.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2032
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO84A4DB76\log.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1660
      • C:\Users\Admin\AppData\Local\Temp\7zO84AA8946\aimsource.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO84AA8946\aimsource.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Users\Admin\AppData\Local\Temp\7zO84AA8946\aimsource.exe
          "C:\Users\Admin\AppData\Local\Temp\7zO84AA8946\aimsource.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2148
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:848
    • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\Desktop\WatchRename.ppt"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:2432
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\LockSkip.asp
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\LockSkip.asp"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:1608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zO84AE2D66\lastlaunch.txt

        Filesize

        1B

        MD5

        cfcd208495d565ef66e7dff9f98764da

        SHA1

        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

        SHA256

        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

        SHA512

        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

      • C:\Users\Admin\AppData\Local\Temp\_MEI26962\python39.dll

        Filesize

        4.3MB

        MD5

        5871ae2a45d675ed9dd077c400018c30

        SHA1

        ddc03af9d433c3dfad8a193c50695139c59b4b58

        SHA256

        5d0ff879174faec03eb173eb2088f2e7519f4663dd6bfe5b817ec602c389ae20

        SHA512

        d87a90dbf42c528bc3fa038eb83d4318d2e8577a590bf9c84641c573b5b2fea83aac91bb108968252e07497424ed85f519a864e955f94a7f8e87bfc38e0f4b7b

      • memory/2064-279-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2064-281-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB