Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 02:57
Behavioral task
behavioral1
Sample
bosskey22.0.0.3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bosskey22.0.0.3.exe
Resource
win10v2004-20240226-en
General
-
Target
bosskey22.0.0.3.exe
-
Size
401KB
-
MD5
ab0ca43773fce4df39e994d4e51d28e0
-
SHA1
2b6417d729bbd9641714950595fc061d8acf5885
-
SHA256
0f9cf011f1f4d66c0f8b38b39e1186ac23135aaf650e70b3a75d882929b1dfa5
-
SHA512
51adecda2257590b108b0c5f78d7ad0f20687ee82bf74f77083171838c332e3a34ed694494f8896307b5d5643fca6519ce66fc32ad242eabeeca95a70449ebcc
-
SSDEEP
6144:Kqc6lXgnhjlhdOc5nyOmlv00UQAngefBPolejmPLZ8sz+7Ij2EPL/rqxxsTZqeFs:et8HPAgefBvjmjZ806424TrCxsqXd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2468-0-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-4-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-5-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-6-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-25-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-26-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-27-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-29-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-32-0x0000000010000000-0x0000000010093000-memory.dmp upx behavioral2/memory/2468-35-0x0000000010000000-0x0000000010093000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2468 bosskey22.0.0.3.exe 2468 bosskey22.0.0.3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2468 bosskey22.0.0.3.exe Token: SeDebugPrivilege 2468 bosskey22.0.0.3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2468 bosskey22.0.0.3.exe 2468 bosskey22.0.0.3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD5e81b81c7904aff49e25b9a6e959af9fa
SHA152244be7620c0e87bdfd9fcd49af2b2696f14544
SHA256ed99deba0dc3f3ee2f1570310f7790d315212e84565cb5ec068e7d2bde8645d4
SHA512ce590ed0b13b0d4261c0d7f1a06e7356bbe6477f27d1f1a235caeb2cadacaffc56f202b48ec96ffecef4abc0a7480f192d82cdc36a465d28ea65ad1496454a68