Analysis
-
max time kernel
83s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-es -
resource tags
arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
06/11/2023, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
XF-BootstrapStudio-6-KG.exe
Resource
win10v2004-20231023-es
General
-
Target
XF-BootstrapStudio-6-KG.exe
-
Size
151KB
-
MD5
0dffe0144c0b3dc03732ea25e173679d
-
SHA1
2bf591f69977bbd7937a3e0e9639180a1a626cd3
-
SHA256
9a6034593d47e6acc583dfcfeb439851d90153445ef6f7ac6a9f575c057e4e34
-
SHA512
68f78167700a97fed48a99db10b496b1a52a8d11cc13f60c7c7eab0fa3d2205cfeaeda4aa38e3a9d1d5dbe788256639b1533e039930d3f395f14f48b7dc81791
-
SSDEEP
3072:AC3xr5YPdvE7Tgof+DLo+djcQHiZyf/sifj5fiTpQQNP:AC3lEd87Tg/0+mQHoEsaJhQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133437035490820149" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe Token: SeShutdownPrivilege 4520 chrome.exe Token: SeCreatePagefilePrivilege 4520 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2772 4520 chrome.exe 100 PID 4520 wrote to memory of 2772 4520 chrome.exe 100 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 4616 4520 chrome.exe 101 PID 4520 wrote to memory of 1540 4520 chrome.exe 102 PID 4520 wrote to memory of 1540 4520 chrome.exe 102 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103 PID 4520 wrote to memory of 1968 4520 chrome.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\XF-BootstrapStudio-6-KG.exe"C:\Users\Admin\AppData\Local\Temp\XF-BootstrapStudio-6-KG.exe"1⤵PID:3064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc40d19758,0x7ffc40d19768,0x7ffc40d197782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:22⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4100 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4356 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1832,i,9269903798033448558,10418772162296545839,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5b9fd923f245b34e9504d639734982384
SHA17a4a3a041859e7e198eecf2e6f86a164429283eb
SHA256ad3235662796c415a21c95def10a2ee6b465dd4006b16feb3a7d6ba9dec1a749
SHA5128eb93f3e46488373428148ee7dd0bf9a1144085b187ca34f5ca3edf1e1bbe59919d32ea49a29f94e767f487c19d884fcf9293f6dca9d7eb1042636ebace0b8a4
-
Filesize
1KB
MD50fa9fe519fee21ccadc4666506f38a4d
SHA15175458345e22d62e864a9e063a4b78cce541706
SHA256d254f20556164d3b6eb042ecf381a7207f67bc1330dcf2204e21c22579160fb9
SHA512d8ff6ef54c7df51e918f2f492ad601f211210e2fc736ce8528ae9362e6e650611ee3306deee9aa4b191181be34fb66b69301f1377cf1c857b40fda65ef6ade97
-
Filesize
371B
MD5d493ccb8420cbb8441feadb2d25c55d4
SHA19d10296263694e7a8bba7d5d9dc5e1fcc5069615
SHA256f8448ee745d753cdbd2e947985f0c198c1db768fe47382fb6d93fc4b504c533e
SHA5128c1d8353fcdf97cb2618fd9d7259a8306de890f61efa63d178d57753e45f56fd3f823123247c537cbdd18af614d16595658b8da354f698d09e75cb5c564ce721
-
Filesize
5KB
MD5da61ef433d6d16e19f3180e907a3e7b0
SHA13700f342af81d8c7392613b39e37ec6a3b24ebb6
SHA256d7a140b9248200def6b8240261f65da907a85e4fa03a586fa243949908301ebd
SHA512dc937ac659e6d4d3184db23c0d78aae1401994626ecbecfb9007a64f17074d059531035ab8b465819c6e537f26fdda5ee2aaf31692a6354347d337a12af986a2
-
Filesize
5KB
MD5a3adbfb2704ee0e258c9e69b123547ae
SHA19ed27f0550608d23e272356bd393340155552523
SHA2561168012759fc594ff59c1559f23221b93663ad509abef0772f93e192e15109c4
SHA5129e7a379771c53225f19759e1771ae73ea7e0cbd0144c9b3734f7a3562a29385b07ec116861ac49d72b21d40e643adb390310eeaa1226013d24935382973b3052
-
Filesize
5KB
MD519823a4e800d3839864ebfdf35b1fb90
SHA1345c6b96040c9839411dfde2f424d229ce91c982
SHA256ea86ec7b6af9d69779f109363b28a8a3bf3a5e15b48c4ae37d25c16d288847bc
SHA51285cd44569062fd33fc071f115d9d1d0b52d4f31cb1f09f38891b3b03f863d7fa74c0964aac043f4f056d02b048ed6db07544314a225a91d2692949ca6398c6e4
-
Filesize
219KB
MD50ab8babb6a3cf99e929ad13ef70476ed
SHA1140a2d31f3ebd7e9983631057f5b3b39f46b08ba
SHA25684c7c24f17c16cc7d8a8778e61a93813cf9839d26e786f28ddd9e78b6e118d43
SHA51214c1fbd07ca0e4661f70b6305cfdd1422c68fa9b471b827d824b47660f3229a0b3ca8b5bf89c4477cbdc24de3f2c39e9065dd5ff367938cf4625d3d1334f13e3
-
Filesize
219KB
MD5c23207e75e4599dab25a6dbe2fb3308f
SHA12972d1360686f77d9fc7e11378f0e29609cb7bec
SHA256b19ed48a2751392df2031fb0996fa65275b8c46963e99814f15fb7f810c8c807
SHA51260ee87c366bf72cf7e71f2d3247a88fc5f93c43b9b1a0ba0c5d13285be24d952921ecb0c515b023f3a7dfc53f2006700bb021bc24f7260b26110345bfd2a85ed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd