Analysis

  • max time kernel
    73s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 12:39

General

  • Target

    SpaceBootstrapper.exe

  • Size

    8.1MB

  • MD5

    075acc6681b76b7711d2c4382f338047

  • SHA1

    2198367e911bf4d9427470d1927605783ef8ad7b

  • SHA256

    563c5f0ef4b8403e4a933931ee762b428fe1d6b229d452a1d5397f050393f4b5

  • SHA512

    29d0bad832d503ca637eccb2dfc7f1855c3e0efa9ff2a50f2c896067917b1acb8dccbbc6a8474d6f9535cb3d40ca0e12be071b475c2b12fc41656ae230177bf4

  • SSDEEP

    196608:YGEUn61W903eV4QJ7MToEuGxgh858F0ibfUxgABObk91tlw8:KUnwW+eGQJ7MTozGxu8C0ibftqi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpaceBootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\SpaceBootstrapper.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\SpaceBootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\SpaceBootstrapper.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c title space - key sys (beta ver.)
        3⤵
          PID:2004
        • C:\Users\Admin\Desktop\Trial\space.exe
          "C:\Users\Admin\Desktop\Trial\space.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\VCRUNTIME140.dll

      Filesize

      116KB

      MD5

      be8dbe2dc77ebe7f88f910c61aec691a

      SHA1

      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

      SHA256

      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

      SHA512

      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_bz2.pyd

      Filesize

      82KB

      MD5

      90f58f625a6655f80c35532a087a0319

      SHA1

      d4a7834201bd796dc786b0eb923f8ec5d60f719b

      SHA256

      bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

      SHA512

      b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_decimal.pyd

      Filesize

      247KB

      MD5

      f78f9855d2a7ca940b6be51d68b80bf2

      SHA1

      fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

      SHA256

      d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

      SHA512

      6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_hashlib.pyd

      Filesize

      64KB

      MD5

      8baeb2bd6e52ba38f445ef71ef43a6b8

      SHA1

      4132f9cd06343ef8b5b60dc8a62be049aa3270c2

      SHA256

      6c50c9801a5caf0bb52b384f9a0d5a4aa182ca835f293a39e8999cf6edf2f087

      SHA512

      804a4e19ea622646cea9e0f8c1e284b7f2d02f3620199fa6930dbdadc654fa137c1e12757f87c3a1a71ceff9244aa2f598ee70d345469ca32a0400563fe3aa65

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_lzma.pyd

      Filesize

      155KB

      MD5

      cf8de1137f36141afd9ff7c52a3264ee

      SHA1

      afde95a1d7a545d913387624ef48c60f23cf4a3f

      SHA256

      22d10e2d6ad3e3ed3c49eb79ab69a81aaa9d16aeca7f948da2fe80877f106c16

      SHA512

      821985ff5bc421bd16b2fa5f77f1f4bf8472d0d1564bc5768e4dbe866ec52865a98356bb3ef23a380058acd0a25cd5a40a1e0dae479f15863e48c4482c89a03f

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_queue.pyd

      Filesize

      31KB

      MD5

      5aa4b057ba2331eed6b4b30f4b3e0d52

      SHA1

      6b9db113c2882743984c3d8b70ec49fc4a136c23

      SHA256

      d43dca0e00c3c11329b68177e967cf5240495c4786f5afa76ac4f267c3a5cdb9

      SHA512

      aa5aa3285ea5c177eca055949c5f550dbd2d2699202a29efe2077213cbc95fff2a36d99eecce249ac04d95baf149b3d8c557a67fc39ead3229f0b329e83447b7

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_socket.pyd

      Filesize

      81KB

      MD5

      439b3ad279befa65bb40ecebddd6228b

      SHA1

      d3ea91ae7cad9e1ebec11c5d0517132bbc14491e

      SHA256

      24017d664af20ee3b89514539345caac83eca34825fcf066a23e8a4c99f73e6d

      SHA512

      a335e1963bb21b34b21aef6b0b14ba8908a5343b88f65294618e029e3d4d0143ea978a5fd76d2df13a918ffab1e2d7143f5a1a91a35e0cc1145809b15af273bd

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\_ssl.pyd

      Filesize

      173KB

      MD5

      6774d6fb8b9e7025254148dc32c49f47

      SHA1

      212e232da95ec8473eb0304cf89a5baf29020137

      SHA256

      2b6f1b1ac47cb7878b62e8d6bb587052f86ca8145b05a261e855305b9ca3d36c

      SHA512

      5d9247dce96599160045962af86fc9e5439f66a7e8d15d1d00726ec1b3b49d9dd172d667380d644d05cb18e45a5419c2594b4bcf5a16ea01542ae4d7d9a05c6e

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\base_library.zip

      Filesize

      1.3MB

      MD5

      ccee0ea5ba04aa4fcb1d5a19e976b54f

      SHA1

      f7a31b2223f1579da1418f8bfe679ad5cb8a58f5

      SHA256

      eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29

      SHA512

      4f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\certifi\cacert.pem

      Filesize

      283KB

      MD5

      302b49c5f476c0ae35571430bb2e4aa0

      SHA1

      35a7837a3f1b960807bf46b1c95ec22792262846

      SHA256

      cf9d37fa81407afe11dcc0d70fe602561422aa2344708c324e4504db8c6c5748

      SHA512

      1345af52984b570b1ff223032575feb36cdfb4f38e75e0bd3b998bc46e9c646f7ac5c583d23a70460219299b9c04875ef672bf5a0d614618731df9b7a5637d0a

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\charset_normalizer\md.cp312-win_amd64.pyd

      Filesize

      10KB

      MD5

      d9e0217a89d9b9d1d778f7e197e0c191

      SHA1

      ec692661fcc0b89e0c3bde1773a6168d285b4f0d

      SHA256

      ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0

      SHA512

      3b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\charset_normalizer\md__mypyc.cp312-win_amd64.pyd

      Filesize

      120KB

      MD5

      bf9a9da1cf3c98346002648c3eae6dcf

      SHA1

      db16c09fdc1722631a7a9c465bfe173d94eb5d8b

      SHA256

      4107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637

      SHA512

      7371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\libcrypto-3.dll

      Filesize

      4.9MB

      MD5

      51e8a5281c2092e45d8c97fbdbf39560

      SHA1

      c499c810ed83aaadce3b267807e593ec6b121211

      SHA256

      2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

      SHA512

      98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\libssl-3.dll

      Filesize

      771KB

      MD5

      bfc834bb2310ddf01be9ad9cff7c2a41

      SHA1

      fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

      SHA256

      41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

      SHA512

      6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\python312.dll

      Filesize

      6.7MB

      MD5

      48ebfefa21b480a9b0dbfc3364e1d066

      SHA1

      b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

      SHA256

      0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

      SHA512

      4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\select.pyd

      Filesize

      29KB

      MD5

      e1604afe8244e1ce4c316c64ea3aa173

      SHA1

      99704d2c0fa2687997381b65ff3b1b7194220a73

      SHA256

      74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

      SHA512

      7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

    • C:\Users\Admin\AppData\Local\Temp\_MEI44642\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      fc47b9e23ddf2c128e3569a622868dbe

      SHA1

      2814643b70847b496cbda990f6442d8ff4f0cb09

      SHA256

      2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309

      SHA512

      7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53

    • C:\Users\Admin\AppData\Local\Temp\space_exec\space_v0.12.2\Trial\Solara\workspace\.tests\listfiles\test_2.txt

      Filesize

      7B

      MD5

      260ca9dd8a4577fc00b7bd5810298076

      SHA1

      53a5687cb26dc41f2ab4033e97e13adefd3740d6

      SHA256

      aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27

      SHA512

      51e85deb51c2b909a21ec5b8e83b1cb28da258b1be227620105a345a2bd4c6aea549cd5429670f2df33324667b9f623a420b3a0bdbbd03ad48602211e75478a7

    • C:\Users\Admin\Desktop\Trial\Anonyme.deps.json

      Filesize

      2KB

      MD5

      e54c2747b42b2630aff7bfa1721b4cd4

      SHA1

      2fa891538a85bd0266a55c84c7b8283e0dd2802d

      SHA256

      54841ca1b259684cc962073a4be7f8dad786d33d94715a439f42c45674931609

      SHA512

      a29c71b6dac68162d3ba497db2f7c2869e2eae7d31ee8a1fe73aad136323382526176950db5ca90da4cfb9021bab213f9f4810243b53b11e0f281f168ab6b23c

    • C:\Users\Admin\Desktop\Trial\Anonyme.dll

      Filesize

      15KB

      MD5

      ca8cf40bb99275306d2f9d89b0f675ee

      SHA1

      5f682da0e3798f589f6ffe0d2b66720f4826c8b6

      SHA256

      1c1455e2768a8a440481043fc64fbe1e6117cb39b646ce06d8a120c753eb6124

      SHA512

      b7c1b694be2d9746432369f4b3515d681aa64d285f59ea47cd0044f3087ef26fe2bd31332c6f9a8bc8af662337d4d0b2551e0c03711c48307c58bc5ea0543376

    • C:\Users\Admin\Desktop\Trial\Anonyme.runtimeconfig.json

      Filesize

      386B

      MD5

      186a65581e2f29258f54d396660409fa

      SHA1

      6f998d3be2e85cb5419205f867135874f27c0a3a

      SHA256

      e1e0974d0e8833375024eb7c78521b3b5cad4228aad22b23d506cbe702445844

      SHA512

      7dea87b523aab01ea3c794779b71bc0b52179e1d5e7b9a45539ddd39c775969ef22853c4c193699aec1e3fa3cbe26e90e3a4881226c52a3aacae1eac260ff896

    • C:\Users\Admin\Desktop\Trial\space.exe

      Filesize

      139KB

      MD5

      691a71bc11dda217a63e66c5ae34ff1e

      SHA1

      6b52745d1c7adc436b77fe387c19bc685ab4c5b1

      SHA256

      745c2a5599add0d27cfa4c2401c6a0ab7a7c9450b78d7766e1204dc65347d9e6

      SHA512

      f37100ae770077b854e6d53c596aff56e006ed68869dd12dcf206942d44c3b511767418e2a29a0f887d1bdd5776fd5e6114cdaaf6a00d224a17c7c892ce465af