Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2023, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
Bots by Moore/bots.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Bots by Moore/bots.exe
Resource
win10v2004-20230220-en
General
-
Target
Bots by Moore/bots.exe
-
Size
14.4MB
-
MD5
8ba5a05ce1d467d4a58d319c863877cf
-
SHA1
73c4227ee4ae46410916c488d1e2859f63df47b9
-
SHA256
311469a1755fc2bf87956df15f3c8b8f4759a7409efcab8078bb7a0e3eab696e
-
SHA512
f2840d07b6a4bf33fece0f4067db18a29ae5c9c3835cc6bb383eaf938219955daef226dcb177ad1ddbf7554549983a5a839a42437ba6d57d09e2a9ab5b25d8fd
-
SSDEEP
196608:YKeTIy+BouA/jLlmNbuKKbYppppppppppmadPzcQokavLRRGbWWsXTPHQT6Gu35c:YKjyUBglm4vCFzcjRTIlsMf2L1xqFB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4524 irsetup.exe -
resource yara_rule behavioral2/files/0x000300000000072f-135.dat upx behavioral2/files/0x000300000000072f-136.dat upx behavioral2/memory/4524-137-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-152-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-158-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-162-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-166-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-170-0x0000000000400000-0x0000000000527000-memory.dmp upx behavioral2/memory/4524-174-0x0000000000400000-0x0000000000527000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\diskmgmt.msc mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3624 mmc.exe Token: SeIncBasePriorityPrivilege 3624 mmc.exe Token: 33 3624 mmc.exe Token: SeIncBasePriorityPrivilege 3624 mmc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4524 irsetup.exe 4524 irsetup.exe 3624 mmc.exe 3624 mmc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4524 2320 bots.exe 83 PID 2320 wrote to memory of 4524 2320 bots.exe 83 PID 2320 wrote to memory of 4524 2320 bots.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe"C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe__IRAOFF:504332 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\Bots by Moore\bots.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4524
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\diskmgmt.msc"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3624
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5bb2829d429a022f8513afdc88b0c7157
SHA1bbaf7eae9c5d06408349a1dd9809d0cee4926b2a
SHA25626ede16d95118b01489d617bd59345414ff56af315d6e7d6102bf0953b8f3d4f
SHA512c1aec7bfc13662c2748d9317c666e2d52f6799933a9eee69dec9792caa7550b36d4f717c46b19f98ea20b5c8e35888b5b12ba1b41dcfc402fc2413837f649080
-
Filesize
7KB
MD5fdf2790f71e43ba825fe513488a1828f
SHA17871e6be3b14d25351615261842da5dad49daf00
SHA256c86333bef0739d0975ce5b016f6cb65ee9a158223051acc965eb456054596059
SHA51246480863cd0f353f743fd5f4beb143a1a393eb4e6efd267189cb9f8d7e5d3ed87d1958017c0398a0802a4b81972d071beaa673bc0df20fc5855fd46d5e31ed59
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4
-
Filesize
440KB
MD575ca7ff96bf5a316c3af2de6a412bd54
SHA10a093950790ff0dddff6f5f29c6b02c10997e0c5
SHA256d95b5bf9ca97c1900de5357743282bab655d61d616606485088e1708559b7cf1
SHA512b8da86f2f1e908955254e5168d0447f479cec7815a8b081a7b38eb87187cb2eb992109c67e006361b96bc1529ee8abc9dc477d78e9ca565e43f5415b492771d4