Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
GetColor/GetColor.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GetColor/GetColor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
GetColor/如果无法运行,请先安装.NET Framework.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
GetColor/如果无法运行,请先安装.NET Framework.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
GetColor/新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
GetColor/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
GetColor/GetColor.exe
-
Size
375KB
-
MD5
4891cd25883a960412809d68a9e08aa8
-
SHA1
d9d6e57fe125fbc58047fd7c7d509fb7c0948392
-
SHA256
4e5a3c8557f9eeaa883ee52dab3251047a0a28aef68b2fbbd8278e29e63f67f4
-
SHA512
0b6930f81e1b0543b355c0cb83c4a25306406400af6fb83b9b88e4e7434294e65d2ce554e199541811900fa6b5cee56618e382c3110c283cdb9497d5b7002f1f
-
SSDEEP
6144:R3eWxZR+Qad3JHXoZMRepmH8sOpk6InMglEOaGDQoyazscUdEschy4a:R3eWTwP3oZ1pbT5gj3DQoyazsf4y4a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 GetColor.exe -
Loads dropped DLL 1 IoCs
pid Process 2632 GetColor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetColor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetColor.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 2632 GetColor.exe Token: SeIncBasePriorityPrivilege 2632 GetColor.exe Token: 33 2632 GetColor.exe Token: SeIncBasePriorityPrivilege 2632 GetColor.exe Token: 33 2740 GetColor.exe Token: SeIncBasePriorityPrivilege 2740 GetColor.exe Token: 33 2740 GetColor.exe Token: SeIncBasePriorityPrivilege 2740 GetColor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2740 2632 GetColor.exe 30 PID 2632 wrote to memory of 2740 2632 GetColor.exe 30 PID 2632 wrote to memory of 2740 2632 GetColor.exe 30 PID 2632 wrote to memory of 2740 2632 GetColor.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\GetColor\GetColor.exe"C:\Users\Admin\AppData\Local\Temp\GetColor\GetColor.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\小色迷 作者_colon_夜.1\1.0.0.0\2010.09.24T16.16\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\GetColor\GetColor.exe"C:\Users\Admin\AppData\Local\Temp\GetColor\GetColor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\小色迷 作者_colon_夜.1\1.0.0.0\2010.09.24T16.16\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\GetColor\GetColor.exe
Filesize17KB
MD5b2d7b0481280db86e4b7fba94d88fd8c
SHA1d7e497e29cda1e75cfab28c5812a3582f2a51f72
SHA2566ca4a8c11342bcc208f2337c284370ac11cd3adf2d29632c31456c463386f460
SHA512656f5c7af998f222d04b93b83343d112fc8f29f39b01c55f3b2ef1ac93159fd4c5de51a206e36e2f284f5554d17fde23b49635855d19a975fbdfbff9609e6dcc