Overview
overview
10Static
static
3BUG32.exe
windows7-x64
BUG32.exe
windows10-2004-x64
Windows/Bonzify.exe
windows7-x64
8Windows/Bonzify.exe
windows10-2004-x64
8BossDaMajor.exe
windows7-x64
BossDaMajor.exe
windows10-2004-x64
FakeGoldenEye.exe
windows7-x64
6FakeGoldenEye.exe
windows10-2004-x64
6PCToaster.exe
windows7-x64
1PCToaster.exe
windows10-2004-x64
7Bolbi.vbs
windows7-x64
10Bolbi.vbs
windows10-2004-x64
10Resubmissions
16-03-2024 17:14
240316-vsg33ahc39 716-03-2024 17:12
240316-vqyb9shb94 1016-03-2024 15:47
240316-s8g2wsea5y 10Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
BUG32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BUG32.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Windows/Bonzify.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Windows/Bonzify.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
BossDaMajor.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
BossDaMajor.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
FakeGoldenEye.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
FakeGoldenEye.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
PCToaster.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
PCToaster.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Bolbi.vbs
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Bolbi.vbs
Resource
win10v2004-20240226-en
General
-
Target
PCToaster.exe
-
Size
411KB
-
MD5
04251a49a240dbf60975ac262fc6aeb7
-
SHA1
e211ca63af2ab85ffab1e5fbbdf28a4ef8f77de0
-
SHA256
85a58aa96dccd94316a34608ba996656a22c8158d5156b6e454d9d69e6ff38c3
-
SHA512
3422a231e1dadb68d3567a99d46791392ecf5883fd3bbc2cae19a595364dac46e4b2712db70b61b488937d906413d39411554034ffd3058389700a93c17568d2
-
SSDEEP
3072:quJFS5Aqu+WwjxeI/0gVnfKl0FA+aPobO24yNz88iu8vDYHTlI5EJD5Hbibfd6PK:/JM0mCsWq1/qpz+nF5c
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1044 1964 PCToaster.exe 28 PID 1964 wrote to memory of 1044 1964 PCToaster.exe 28 PID 1964 wrote to memory of 1044 1964 PCToaster.exe 28 PID 1964 wrote to memory of 1044 1964 PCToaster.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\PCToaster.exe"2⤵PID:1044
-