Analysis
-
max time kernel
71s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-12-2020 15:41
Static task
static1
Behavioral task
behavioral1
Sample
bootstrap.min.js.download.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
bootstrap.min.js.download.js
Resource
win10v20201028
General
-
Target
bootstrap.min.js.download.js
-
Size
34KB
-
MD5
2616d3564578d8f845813483352802a9
-
SHA1
5ada7c103fc1deabc925cc1fdbbb6e451c21fc70
-
SHA256
f971b901aeb9e55b07d472afee09bd5ae05159e1119dbd16d993e473565e7fc0
-
SHA512
e3d8bc8fd58b0ac1d9fc444f21f2dad94defde536af2aadb6ace768ae0bca9f9c9274161b076fc546ced174f23cc7495a8c5049ab00be19c75f6310e91ab1edc
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2CB8CA0-3710-11EB-BEBD-F648E9E4AC23} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4536 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4536 iexplore.exe 4536 iexplore.exe 4572 IEXPLORE.EXE 4572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
firefox.exeiexplore.exedescription pid process target process PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 648 wrote to memory of 608 648 firefox.exe firefox.exe PID 4536 wrote to memory of 4572 4536 iexplore.exe IEXPLORE.EXE PID 4536 wrote to memory of 4572 4536 iexplore.exe IEXPLORE.EXE PID 4536 wrote to memory of 4572 4536 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\bootstrap.min.js.download.js1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\CompressPublish.xhtml1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4536 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx