Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2023, 02:15

General

  • Target

    Bots by Moore/bots.exe

  • Size

    14.4MB

  • MD5

    8ba5a05ce1d467d4a58d319c863877cf

  • SHA1

    73c4227ee4ae46410916c488d1e2859f63df47b9

  • SHA256

    311469a1755fc2bf87956df15f3c8b8f4759a7409efcab8078bb7a0e3eab696e

  • SHA512

    f2840d07b6a4bf33fece0f4067db18a29ae5c9c3835cc6bb383eaf938219955daef226dcb177ad1ddbf7554549983a5a839a42437ba6d57d09e2a9ab5b25d8fd

  • SSDEEP

    196608:YKeTIy+BouA/jLlmNbuKKbYppppppppppmadPzcQokavLRRGbWWsXTPHQT6Gu35c:YKjyUBglm4vCFzcjRTIlsMf2L1xqFB

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe
    "C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe
      __IRAOFF:504332 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4524
  • C:\Windows\system32\mmc.exe
    "C:\Windows\system32\mmc.exe" "C:\Windows\system32\diskmgmt.msc"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3624
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:4848
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:1844

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\IRIMG1.JPG

      Filesize

      24KB

      MD5

      bb2829d429a022f8513afdc88b0c7157

      SHA1

      bbaf7eae9c5d06408349a1dd9809d0cee4926b2a

      SHA256

      26ede16d95118b01489d617bd59345414ff56af315d6e7d6102bf0953b8f3d4f

      SHA512

      c1aec7bfc13662c2748d9317c666e2d52f6799933a9eee69dec9792caa7550b36d4f717c46b19f98ea20b5c8e35888b5b12ba1b41dcfc402fc2413837f649080

    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\game.ico

      Filesize

      7KB

      MD5

      fdf2790f71e43ba825fe513488a1828f

      SHA1

      7871e6be3b14d25351615261842da5dad49daf00

      SHA256

      c86333bef0739d0975ce5b016f6cb65ee9a158223051acc965eb456054596059

      SHA512

      46480863cd0f353f743fd5f4beb143a1a393eb4e6efd267189cb9f8d7e5d3ed87d1958017c0398a0802a4b81972d071beaa673bc0df20fc5855fd46d5e31ed59

    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe

      Filesize

      440KB

      MD5

      75ca7ff96bf5a316c3af2de6a412bd54

      SHA1

      0a093950790ff0dddff6f5f29c6b02c10997e0c5

      SHA256

      d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1

      SHA512

      b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4

    • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe

      Filesize

      440KB

      MD5

      75ca7ff96bf5a316c3af2de6a412bd54

      SHA1

      0a093950790ff0dddff6f5f29c6b02c10997e0c5

      SHA256

      d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1

      SHA512

      b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4

    • memory/4524-137-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-152-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-158-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-162-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-166-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-170-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4524-174-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB