Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 16:41

General

  • Target

    BootsTrapperU.exe

  • Size

    165KB

  • MD5

    8b57e3af9a6b863fbe0746db752eba75

  • SHA1

    bca3c16f360dc795cb31882c04c9ff0ec4d20511

  • SHA256

    ee6e94dcb0f4bb34d487919faee67b4c178daee696d5bc84b229a24c8cad1c6f

  • SHA512

    1799155f917d2a47691745c71b9e5dcb5b21e05fd5a7ae3105a6375bf2a5b5fdf944fc773177f670ea051bf0098a5c9685e14dba67c676fb0a5cdb51f46e4add

  • SSDEEP

    3072:wxhMfvkWEpAJvlOT/NAWCNsxi8fdMznFHTfgCkPbQN982cUJWVgVK5o6V9207o0+:wxCfvkWEe9hWc8fdMFHrsPbbo742wb3B

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootsTrapperU.exe
    "C:\Users\Admin\AppData\Local\Temp\BootsTrapperU.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\MatSploit.exe
      "C:\Users\Admin\AppData\Local\Temp\MatSploit.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ICSharpCode.AvalonEdit.dll

    Filesize

    604KB

    MD5

    85525afb01eafb7cd53e171344de4653

    SHA1

    65e4609b6e1d9d0de5568049687edd84fda6d2d3

    SHA256

    b5180b33e6bb8f215d69d91a6fab46e2e633b222095bcfcafba2530beb181eab

    SHA512

    3b30b7b4b32ab72ac0903e2053613bf0cd33c8f54879ca012dee12b319aa598e84329e59fc0edb19ad2b4ba6b6d25c12c88cbb78f655e3e6d6396ce909b10799

  • C:\Users\Admin\AppData\Local\Temp\ICSharpCode.AvalonEdit.dll

    Filesize

    604KB

    MD5

    85525afb01eafb7cd53e171344de4653

    SHA1

    65e4609b6e1d9d0de5568049687edd84fda6d2d3

    SHA256

    b5180b33e6bb8f215d69d91a6fab46e2e633b222095bcfcafba2530beb181eab

    SHA512

    3b30b7b4b32ab72ac0903e2053613bf0cd33c8f54879ca012dee12b319aa598e84329e59fc0edb19ad2b4ba6b6d25c12c88cbb78f655e3e6d6396ce909b10799

  • C:\Users\Admin\AppData\Local\Temp\MatSploit.exe

    Filesize

    2.5MB

    MD5

    dcb25045813cf70b014e3b94f61fb1dd

    SHA1

    05677911206e6dcde403a6232f1dcb9f77abf959

    SHA256

    366b2611923ce8255940aafc03c3c156f35b6d0dabe4c5b728233ac0d6c51822

    SHA512

    23e14f7b2f45c8dddc64cd6d301b144748ac3599139c0ad518d2f75d648c746d80e02334cdc7b014f3efe09844a4d3809e7f3177e623a89033d8de948c12b2ce

  • C:\Users\Admin\AppData\Local\Temp\MatSploit.exe

    Filesize

    2.5MB

    MD5

    dcb25045813cf70b014e3b94f61fb1dd

    SHA1

    05677911206e6dcde403a6232f1dcb9f77abf959

    SHA256

    366b2611923ce8255940aafc03c3c156f35b6d0dabe4c5b728233ac0d6c51822

    SHA512

    23e14f7b2f45c8dddc64cd6d301b144748ac3599139c0ad518d2f75d648c746d80e02334cdc7b014f3efe09844a4d3809e7f3177e623a89033d8de948c12b2ce

  • memory/384-161-0x000000006D430000-0x000000006D442000-memory.dmp

    Filesize

    72KB

  • memory/2056-136-0x0000000007670000-0x0000000007680000-memory.dmp

    Filesize

    64KB

  • memory/2056-140-0x0000000007670000-0x0000000007680000-memory.dmp

    Filesize

    64KB

  • memory/2056-144-0x0000000007670000-0x0000000007680000-memory.dmp

    Filesize

    64KB

  • memory/2056-138-0x000000000A990000-0x000000000A99E000-memory.dmp

    Filesize

    56KB

  • memory/2056-137-0x000000000BA00000-0x000000000BA38000-memory.dmp

    Filesize

    224KB

  • memory/2056-133-0x00000000007D0000-0x0000000000802000-memory.dmp

    Filesize

    200KB

  • memory/2056-135-0x000000000A8E0000-0x000000000A8E8000-memory.dmp

    Filesize

    32KB

  • memory/2056-134-0x0000000007670000-0x0000000007680000-memory.dmp

    Filesize

    64KB