Overview
overview
8Static
static
1Captcha-Ow...er.zip
windows7-x64
8Captcha-Ow...er.zip
windows10-2004-x64
1HuntBot/LICENSE
windows7-x64
1HuntBot/LICENSE
windows10-2004-x64
1HuntBot/README.md
windows7-x64
3HuntBot/README.md
windows10-2004-x64
3HuntBot/as...th.png
windows7-x64
3HuntBot/as...th.png
windows10-2004-x64
3HuntBot/as...an.png
windows7-x64
3HuntBot/as...an.png
windows10-2004-x64
3HuntBot/as...js.png
windows7-x64
3HuntBot/as...js.png
windows10-2004-x64
3HuntBot/as...ap.png
windows7-x64
3HuntBot/as...ap.png
windows10-2004-x64
3HuntBot/co...gi.mjs
windows7-x64
3HuntBot/co...gi.mjs
windows10-2004-x64
3HuntBot/co...am.mjs
windows7-x64
3HuntBot/co...am.mjs
windows10-2004-x64
3HuntBot/co...ur.mjs
windows7-x64
3HuntBot/co...ur.mjs
windows10-2004-x64
3HuntBot/co...ur.mjs
windows7-x64
3HuntBot/co...ur.mjs
windows10-2004-x64
3HuntBot/co...ng.mjs
windows7-x64
3HuntBot/co...ng.mjs
windows10-2004-x64
3HuntBot/co...ay.mjs
windows7-x64
3HuntBot/co...ay.mjs
windows10-2004-x64
3HuntBot/co...end.js
windows7-x64
1HuntBot/co...end.js
windows10-2004-x64
1HuntBot/co...ım.js
windows7-x64
1HuntBot/co...ım.js
windows10-2004-x64
1HuntBot/co...ile.js
windows7-x64
1HuntBot/co...ile.js
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
Captcha-Owo-Bot-Master.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Captcha-Owo-Bot-Master.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
HuntBot/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
HuntBot/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
HuntBot/README.md
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
HuntBot/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
HuntBot/assets/addtopath.png
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
HuntBot/assets/addtopath.png
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
HuntBot/assets/ekran.png
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
HuntBot/assets/ekran.png
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
HuntBot/assets/nodejs.png
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
HuntBot/assets/nodejs.png
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
HuntBot/assets/tehlikeli-hesap.png
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
HuntBot/assets/tehlikeli-hesap.png
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
HuntBot/commands/bilgi.mjs
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
HuntBot/commands/bilgi.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
HuntBot/commands/devam.mjs
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HuntBot/commands/devam.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
HuntBot/commands/dur.mjs
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
HuntBot/commands/dur.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
HuntBot/commands/durdur.mjs
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
HuntBot/commands/durdur.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
HuntBot/commands/ping.mjs
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
HuntBot/commands/ping.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
HuntBot/commands/say.mjs
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
HuntBot/commands/say.mjs
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
HuntBot/commands/send.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
HuntBot/commands/send.js
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
HuntBot/commands/yardım.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
HuntBot/commands/yardım.js
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
HuntBot/commands/yenile.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
HuntBot/commands/yenile.js
Resource
win10v2004-20240221-en
General
-
Target
HuntBot/README.md
-
Size
2KB
-
MD5
cae438bb300819db8551f5d5892a902c
-
SHA1
000ad78eeaa9ed90268fc35013f717a0a955cb2e
-
SHA256
da437a45b62ebd5004bd798d8f71fe44d085207945a12adb1cf535be73adeb70
-
SHA512
5ccc64752d9e1d1316aaff10ffd3d08b7fbd117fc96ac93c945d167c592f3ae7a14c0fdb4e2c7924406c7fe6ff179fcfe5592c418c9efe822b065f32637e43f8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2704 1304 cmd.exe 29 PID 1304 wrote to memory of 2704 1304 cmd.exe 29 PID 1304 wrote to memory of 2704 1304 cmd.exe 29 PID 2704 wrote to memory of 2820 2704 rundll32.exe 30 PID 2704 wrote to memory of 2820 2704 rundll32.exe 30 PID 2704 wrote to memory of 2820 2704 rundll32.exe 30 PID 2704 wrote to memory of 2820 2704 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\HuntBot\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\HuntBot\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\HuntBot\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b5002ad2cc99c49086777d99128bce5b
SHA14fb70ec9a605595c6c02b74cc22f83e239bbadad
SHA2568a4e059e1fc975c822dae453d155a95fae1800f495c4ee1f8ed266850583a6b2
SHA51285f287df386f69056437d831d6ed749abd920d67301fbe924fa989d78ae247ab23fdf42b6f5df5c2daef6084475e4c3c369d0be31dbbd06fc2b64bef11bfac31