Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 02:57

General

  • Target

    bosskey22.0.0.3.exe

  • Size

    401KB

  • MD5

    ab0ca43773fce4df39e994d4e51d28e0

  • SHA1

    2b6417d729bbd9641714950595fc061d8acf5885

  • SHA256

    0f9cf011f1f4d66c0f8b38b39e1186ac23135aaf650e70b3a75d882929b1dfa5

  • SHA512

    51adecda2257590b108b0c5f78d7ad0f20687ee82bf74f77083171838c332e3a34ed694494f8896307b5d5643fca6519ce66fc32ad242eabeeca95a70449ebcc

  • SSDEEP

    6144:Kqc6lXgnhjlhdOc5nyOmlv00UQAngefBPolejmPLZ8sz+7Ij2EPL/rqxxsTZqeFs:et8HPAgefBvjmjZ806424TrCxsqXd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bosskey22.0.0.3.exe
    "C:\Users\Admin\AppData\Local\Temp\bosskey22.0.0.3.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar1B72.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • C:\Users\Admin\AppData\Local\Temp\softconfig.ini

    Filesize

    172B

    MD5

    e81b81c7904aff49e25b9a6e959af9fa

    SHA1

    52244be7620c0e87bdfd9fcd49af2b2696f14544

    SHA256

    ed99deba0dc3f3ee2f1570310f7790d315212e84565cb5ec068e7d2bde8645d4

    SHA512

    ce590ed0b13b0d4261c0d7f1a06e7356bbe6477f27d1f1a235caeb2cadacaffc56f202b48ec96ffecef4abc0a7480f192d82cdc36a465d28ea65ad1496454a68

  • memory/1988-3-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-25-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-24-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-0-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-27-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-28-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-4-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-5-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-70-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-71-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/1988-76-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB