Analysis
-
max time kernel
71s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:26
Behavioral task
behavioral1
Sample
Bootstrapper/bootstrapper.exe
Resource
win7-20240705-en
1 signatures
150 seconds
General
-
Target
Bootstrapper/bootstrapper.exe
-
Size
3.2MB
-
MD5
177816525d136613c567a56d6a91c8de
-
SHA1
9a95b84525f542c2e8187107ba2eb49068497bc5
-
SHA256
7113278325a80d45ade822091752e83c48132b9055cbf4bd85c500dd0bf801a4
-
SHA512
a442ed4c54d185b84c2a5d404cf5d33783e26ee2bfaa4c93269e071e16203d701a0effb01e0e995be7aba60b29004d81ea8f38c0b004b5df2d83e53ad5c7aeae
-
SSDEEP
98304:U0xdkLxzUC8tuX5GPtrW0mQ9R2M66PiOmyA5jCPQ1sOGY3:JxKzUv0MPRAQ9A16CyAh1sOG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bootstrapper.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bootstrapper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bootstrapper.exe -
resource yara_rule behavioral2/memory/4976-0-0x0000000140000000-0x00000001408B8000-memory.dmp themida behavioral2/memory/4976-2-0x0000000140000000-0x00000001408B8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bootstrapper.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4976 bootstrapper.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper\bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper\bootstrapper.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4976