Analysis

  • max time kernel
    129s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/03/2024, 15:05

General

  • Target

    Vulkan/Assets/Bootstrapper.exe

  • Size

    198KB

  • MD5

    3a61d18866ec289415e213ab5d34de69

  • SHA1

    83c29a47600dc00feb87954418e3873edd42e4aa

  • SHA256

    e5807f713d9b89a54c8916d30705401e82c83b74a3b195db5b399e90ff945ce1

  • SHA512

    a88d52d94acf8ee8858bad9dadebadd7c0d09572f459f28d01fef35c9dd1b5af51a96a2b13b4b5fbea8e483c2832d3a6d4a0cc9b60ebbe343a8c65c0de8d2ed4

  • SSDEEP

    1536:96R6ONuvr2zhBIEMUkwV/n1EnXONHLfE6XZ3bU9dbJOOI:buh/fP1EXyzsOT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vulkan\Assets\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Vulkan\Assets\Bootstrapper.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Users\Admin\AppData\Local\Temp\Vulkan\Assets\Application\vulkan.exe
      "C:\Users\Admin\AppData\Local\Temp\Vulkan\Assets\Application\vulkan.exe"
      2⤵
      • Executes dropped EXE
      PID:3080

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Vulkan\Assets\Application\vulkan.exe

          Filesize

          151KB

          MD5

          9b5b0038451fe15de9b7caca8938cf8e

          SHA1

          ddf094b90dbe5e1bf407d99b50c9362a46bc3f36

          SHA256

          63febda7441e0f49c07e504f462bd48f261bf4f16b7772dde41ddeb7b02ca9d8

          SHA512

          b42e43db823add4f057debf71ffb928fa8f06dea42ec8acda5281993502591d126aad711cd10f88a074850389ce0fef204a08e7c5d05f68951a612657f956902

        • memory/3276-0-0x0000000000910000-0x0000000000946000-memory.dmp

          Filesize

          216KB

        • memory/3276-1-0x00000000733C0000-0x0000000073AAE000-memory.dmp

          Filesize

          6.9MB

        • memory/3276-2-0x00000000057C0000-0x0000000005CBE000-memory.dmp

          Filesize

          5.0MB

        • memory/3276-3-0x00000000051D0000-0x0000000005262000-memory.dmp

          Filesize

          584KB

        • memory/3276-4-0x00000000053E0000-0x00000000053F0000-memory.dmp

          Filesize

          64KB

        • memory/3276-5-0x0000000005190000-0x000000000519A000-memory.dmp

          Filesize

          40KB

        • memory/3276-6-0x00000000053E0000-0x00000000053F0000-memory.dmp

          Filesize

          64KB

        • memory/3276-8-0x000000000A210000-0x000000000A21A000-memory.dmp

          Filesize

          40KB

        • memory/3276-9-0x000000000B360000-0x000000000B372000-memory.dmp

          Filesize

          72KB

        • memory/3276-26-0x00000000733C0000-0x0000000073AAE000-memory.dmp

          Filesize

          6.9MB