Analysis
-
max time kernel
78s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 23:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Bootstrapper.exe
-
Size
797KB
-
MD5
86bf094b70901e55a281e0a0683dd8b3
-
SHA1
24afc916d186facaf7885363bf335e3e5b7d69b9
-
SHA256
2a4255d739e42838d49159d7228952b512a2c8ccb6f4b0c8d35543912130dac6
-
SHA512
2f33349c13f7778869f4e200380acd9c12e41a981a30005ad01aa8c29442d9bfdfb2a76a1b589be1efb2e4a314cbdf92f691a12b0fa487af4160e7d87ff25e56
-
SSDEEP
12288:e/+ubxKHJg5bbEjlsqRoAQpjFVfG0c4XqCon9hUpVo34u:Q+ubYHYqRoAQpjFVG0HXqlF4u
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com -
Program crash 1 IoCs
pid pid_target Process procid_target 3032 1656 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3032 1656 Bootstrapper.exe 30 PID 1656 wrote to memory of 3032 1656 Bootstrapper.exe 30 PID 1656 wrote to memory of 3032 1656 Bootstrapper.exe 30 PID 1656 wrote to memory of 3032 1656 Bootstrapper.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 13962⤵
- Program crash
PID:3032
-