Analysis
-
max time kernel
242s -
max time network
247s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
driver_booster_setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
driver_booster_setup.exe
Resource
win10v2004-20230220-en
General
-
Target
driver_booster_setup.exe
-
Size
27.6MB
-
MD5
ccc48304afa2e7c58492babc297db8a4
-
SHA1
decd98730cf34e1567965f6fb7085569fc1053e8
-
SHA256
e02061a4626f950b41d89c21e9a780f8aee5c5ddda7880b753d660db09117910
-
SHA512
79bd4dda233b714ecd6746c5f78f9d441852e333202fc74da6430d23d7dc1deadebb5a5608da63ac63ee0891a99ee259d3498d58ac59621226d8bf7862de4b04
-
SSDEEP
786432:e9ThknZ2E7r7s8OoqHeTfy3UjKt1tdypqVEB8YFj:e9ThknZ2+9OFHe7qO0dhEh
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1156 driver_booster_setup.tmp 1356 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2012 driver_booster_setup.exe 1156 driver_booster_setup.tmp 1156 driver_booster_setup.tmp 1156 driver_booster_setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1156 driver_booster_setup.tmp 1156 driver_booster_setup.tmp 1356 setup.exe 1356 setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1156 driver_booster_setup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 2012 wrote to memory of 1156 2012 driver_booster_setup.exe 28 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29 PID 1156 wrote to memory of 1356 1156 driver_booster_setup.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\driver_booster_setup.exe"C:\Users\Admin\AppData\Local\Temp\driver_booster_setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\is-2MF9P.tmp\driver_booster_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-2MF9P.tmp\driver_booster_setup.tmp" /SL5="$C0122,28225140,139264,C:\Users\Admin\AppData\Local\Temp\driver_booster_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\is-6MTIB.tmp-dbinst\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-6MTIB.tmp-dbinst\setup.exe" "C:\Users\Admin\AppData\Local\Temp\driver_booster_setup.exe" /title="Driver Booster 10" /dbver=10.4.0.128 /eula="C:\Users\Admin\AppData\Local\Temp\is-6MTIB.tmp-dbinst\EULA.rtf" /showlearnmore /pmtproduct /nochromepmt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
24KB
MD58e7f2723f0e72bc6abefca738c9c1ca4
SHA1969a4a6f31e146040a101d526886ede9a7c5c432
SHA256f3c690feab9ab2b7dea8ea6334b484768f19caaf85dfa14be2bce5e4fdbffd4b
SHA5129a3efa9dd002394050cbd457adb67121fcae7a31b66b42e3d612725b9166bd76c4f8c73ed039226c16248461c7f4f1fb6cac91960b7bb57a3273fbd022b1e232
-
Filesize
1.2MB
MD568b52a0b8e3d45bf3b520a0e7f16dad1
SHA1e50408326eafb5ca8adc70db29c33b64e25bbbbd
SHA256b409d6d6f8896dc2afd1774479c741ca253c0e9b4732daaa08af84aa9c96888b
SHA512b8e0b486e2b9652831eb8efe48cf9575eef49204e827a64d69ae7c9c30304b2d98a66c28f1072fe8596847c15f13bbf7ec39d7708684ff64051bbae7ed063faf
-
Filesize
5.8MB
MD53d403676517f6a99de035a04dc3f3f82
SHA1ed69d8f485374dfb58a5b651b1f3f1bab8ee9541
SHA256668f4f4ef277783cc66408d6631b63e9a24ffcd978834835fdb8fb2aa345a56e
SHA5124ba6f75e9b518474bf9b846cda386bde0ca65233dd489b357b967e842af71ebca6e325b9fc9b8a0d1d775b16198ff31a6c2d2223797d2a3c490d5da001e8887e
-
Filesize
5.8MB
MD53d403676517f6a99de035a04dc3f3f82
SHA1ed69d8f485374dfb58a5b651b1f3f1bab8ee9541
SHA256668f4f4ef277783cc66408d6631b63e9a24ffcd978834835fdb8fb2aa345a56e
SHA5124ba6f75e9b518474bf9b846cda386bde0ca65233dd489b357b967e842af71ebca6e325b9fc9b8a0d1d775b16198ff31a6c2d2223797d2a3c490d5da001e8887e
-
Filesize
5.8MB
MD53d403676517f6a99de035a04dc3f3f82
SHA1ed69d8f485374dfb58a5b651b1f3f1bab8ee9541
SHA256668f4f4ef277783cc66408d6631b63e9a24ffcd978834835fdb8fb2aa345a56e
SHA5124ba6f75e9b518474bf9b846cda386bde0ca65233dd489b357b967e842af71ebca6e325b9fc9b8a0d1d775b16198ff31a6c2d2223797d2a3c490d5da001e8887e
-
Filesize
1.2MB
MD568b52a0b8e3d45bf3b520a0e7f16dad1
SHA1e50408326eafb5ca8adc70db29c33b64e25bbbbd
SHA256b409d6d6f8896dc2afd1774479c741ca253c0e9b4732daaa08af84aa9c96888b
SHA512b8e0b486e2b9652831eb8efe48cf9575eef49204e827a64d69ae7c9c30304b2d98a66c28f1072fe8596847c15f13bbf7ec39d7708684ff64051bbae7ed063faf
-
Filesize
5.8MB
MD53d403676517f6a99de035a04dc3f3f82
SHA1ed69d8f485374dfb58a5b651b1f3f1bab8ee9541
SHA256668f4f4ef277783cc66408d6631b63e9a24ffcd978834835fdb8fb2aa345a56e
SHA5124ba6f75e9b518474bf9b846cda386bde0ca65233dd489b357b967e842af71ebca6e325b9fc9b8a0d1d775b16198ff31a6c2d2223797d2a3c490d5da001e8887e
-
Filesize
8.6MB
MD55ff2b8b8bf24896093f7e44374fabf95
SHA169bc407fe124e7e475a90cb9702f768a4b412da3
SHA25677b5f3864c9ded87ccdc2c550d1ac107c918c224ee9aeada6f3fd8834f935d91
SHA512391ea2b19131d73f194afc2ddd594f8648e6acd9c0a7fabffcff1fb27d83ddbd91367bfbf32f7b354d31ae931dea04b73045236eb98848d65fe4de8ee02fb50e
-
Filesize
8.6MB
MD55ff2b8b8bf24896093f7e44374fabf95
SHA169bc407fe124e7e475a90cb9702f768a4b412da3
SHA25677b5f3864c9ded87ccdc2c550d1ac107c918c224ee9aeada6f3fd8834f935d91
SHA512391ea2b19131d73f194afc2ddd594f8648e6acd9c0a7fabffcff1fb27d83ddbd91367bfbf32f7b354d31ae931dea04b73045236eb98848d65fe4de8ee02fb50e