Analysis
-
max time kernel
482s -
max time network
484s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 17:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240705-en
5 signatures
600 seconds
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240709-en
14 signatures
600 seconds
General
-
Target
Bootstrapper.exe
-
Size
793KB
-
MD5
d674b62b359b2ec81398348904f8bee9
-
SHA1
609d29c3d5503bc382ab55188e67e002eb8270a7
-
SHA256
95486d06db5126eb557c563b5597e08b236634f75853a6491c485cb64cf28ae2
-
SHA512
a4fe0e357e5c44ebdf87fa0273266d35ff181e4ee5c041708f44b09f5225f5841b8cb677eda903b2869fa4a86d0b39ff7b371949928bb0a1cc4cbb008f978cad
-
SSDEEP
12288:d63MnScwI8yPExQwa05tOocHFj6rftMH6n6rmP2vCSpm5r8d:MNcRPPEftOocHFj6JMHOdy
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2080 2528 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2080 2528 Bootstrapper.exe 30 PID 2528 wrote to memory of 2080 2528 Bootstrapper.exe 30 PID 2528 wrote to memory of 2080 2528 Bootstrapper.exe 30 PID 2528 wrote to memory of 2080 2528 Bootstrapper.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 14922⤵
- Program crash
PID:2080
-