Analysis

  • max time kernel
    53s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 16:06

General

  • Target

    Bootstrapper.exe

  • Size

    793KB

  • MD5

    7d9914483a2f5ae005d4f11f7ca786cb

  • SHA1

    e39e7916c3fff339df9a068bc108d4f7b770d232

  • SHA256

    acc5fec0885cda45e8d3f235f0dbb7fd6f1a3f83a427f29ee18a33533aa125a7

  • SHA512

    708d1ea1824c6ce5b7b933fb3142b276004541f6d34d1067fa90cffa0b64597d41403a42cb07ba826ad7d78eec4fa7ae3c079143f069f1180ef82b86e105aa34

  • SSDEEP

    12288:xJzpLYI40INR++Qwa0FvXocH9j6d8emgauKrmP23qSpmyr8:zGIt8R+wvXocH9j6qemgaut

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 1392
      2⤵
      • Program crash
      PID:2792
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7729758,0x7fef7729768,0x7fef7729778
      2⤵
        PID:2648
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:2
        2⤵
          PID:1444
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:8
          2⤵
            PID:1944
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1512 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:8
            2⤵
              PID:2004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:1
              2⤵
                PID:2152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:1
                2⤵
                  PID:3060
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1372 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:2
                  2⤵
                    PID:948
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1444 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:1
                    2⤵
                      PID:912
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:8
                      2⤵
                        PID:1640
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3216 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:1
                        2⤵
                          PID:1504
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:8
                          2⤵
                            PID:1820
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3452 --field-trial-handle=1272,i,4855470066740584356,4950891764142537895,131072 /prefetch:1
                            2⤵
                              PID:2156
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:584

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                              Filesize

                              1KB

                              MD5

                              55540a230bdab55187a841cfe1aa1545

                              SHA1

                              363e4734f757bdeb89868efe94907774a327695e

                              SHA256

                              d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                              SHA512

                              c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                              Filesize

                              230B

                              MD5

                              33c59a81dd2a1ef087d96c8acc6b2858

                              SHA1

                              baac32a7702e14e0740991f75964797d83df1384

                              SHA256

                              8a81829611d5edb6e18d89b85b18a461183d4bea018ef8403d1df09b1cc4ce5d

                              SHA512

                              148b95709872271f40fe6f1c91af6fb31f2576c59869d5315327ac169c2001a1e2866ba5b4a67f841db2dcf5f20c9cedecf3a4a62a7928fd58012fd6768df73e

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              4a9874b34330ac3d1c7eb5e001c6bdca

                              SHA1

                              d480fdb8ca46762957ae2c38cd5452e11a67728d

                              SHA256

                              031da35cc428c84d70555aabf7973cd2c8a5a787603243fd3069805284ce4d4e

                              SHA512

                              0feee0633cae5e7dbecaf014cb924fe48e8156552f4d4b88e43b9730763486dcd039d4c3eaff7d87bff40e456b76b7be3e9a8e49fb33169d3ff675bf511f1e69

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              342B

                              MD5

                              4019527855dce914c789741ea40fa812

                              SHA1

                              abb3ce307869071ca0a001a36a1d9a59da5a1d12

                              SHA256

                              6b762bed1102efafdafadccebfbdd30e5b9d763c8440f4977bdd92d8749e10ae

                              SHA512

                              781c1f168def34b5b28c14197e1abc38deac13a47c117cdda5976205c387cef746c8af2944cdc90a85b1b133ef226ff386402154b44826e34997e4a8324a0c37

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                              Filesize

                              16B

                              MD5

                              aefd77f47fb84fae5ea194496b44c67a

                              SHA1

                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                              SHA256

                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                              SHA512

                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              359B

                              MD5

                              a8b2c9871af09e3a4af929e831bb559a

                              SHA1

                              06fbfa33139cdbe07de4de9bee3089ef555fadb2

                              SHA256

                              6ae0199f9edc2501bdb6790e3aa6931c699ed3bb0002054bb4792a4a2cdce743

                              SHA512

                              0600cac1ff0a02c015f2c5401d1010af0dd3a4c5f368ac02d8f846c5125cd153bfcfecb9f06423b712b8f9d1442499b33db5a887c36e90e952b90f08ae5582dd

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              d00fc6919d831de8412437fff8111bfc

                              SHA1

                              03cad222fa0ffc5a83c0240b7d36118dfe06d757

                              SHA256

                              bc4bc54c981fe27cefd4c74e56217f525d4d1aa7316fb59902615e36cabc2e30

                              SHA512

                              150c4a7f46b43a99ae88cbb00281ee348ce7c1ce8ea3bcb3d68be2dc5029cec1618ab86961dee50fd390743b845c91f4b853f7ffb71e01fbe522c2fe8bf037e3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              8f755a04150b3ef1422052d3c08ca1df

                              SHA1

                              e904f3254ed3e16572740b8a9c6b83b4fb258f81

                              SHA256

                              cb7bba000cc976655e1aed64f272a2bf17fef5b3b97599b29dba1b6895c72e68

                              SHA512

                              0e43524a8ca783231d21b9229df16320cb253930774de1d40e3da1e56f4b4fa282652c77d6371e71cce2facbc2ae5180105569237658b4ae62e50c117300b67f

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              5d4742ff8968f47c990edb5a7e4aac19

                              SHA1

                              e0b613a5cb0733906a0efc34efe1fcb8542d0e08

                              SHA256

                              141c15d91a76cfcc18492c6f1d54da3c07e46a29cc77674f450d3182185e7f57

                              SHA512

                              d08d5c3f09ec70f43e71f35ea782417af7049ee9b632d4091c6f167fd8f54ddc00c6c35f02fa41ac233ce4c2710ff3d9e374b2af4fe3d45e3c66cbe8f02f44a4

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              2ec308b442df44877f6ab0623fb71532

                              SHA1

                              9cc15053ee86b0d7a1eabbecd6adf31290ac93b6

                              SHA256

                              4aaca0d14d076570fd3771a2a35b5dd427a1797266df7cc29b34ccebdac5fed9

                              SHA512

                              e71280b8e77553f979cc90cb71b448998e132cec0b9e3603be3a4a5a030318bfbe64326200cb73c710c060e9af067c5d230858c19461a7dd7b3ad44572112701

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              3184e1f942a6b6d286cb58f751237d09

                              SHA1

                              4eeb93bca63916321dfcbfec66128562eb5b1745

                              SHA256

                              a84a968a63f9f969fd22800e76a0f37af7060ffc0c15c2f30411bfa5a5dab7b3

                              SHA512

                              82d3b68cdfff5b6d85eceb89a2ec6144074af5d9ccf2c5cd577878d635b766a8d287fcafb3719f5cd5d1f75e211667da9ba4cfbdaf53880ab05f51a6243388d7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                              Filesize

                              16B

                              MD5

                              18e723571b00fb1694a3bad6c78e4054

                              SHA1

                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                              SHA256

                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                              SHA512

                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                            • C:\Users\Admin\AppData\Local\Temp\CabF20.tmp

                              Filesize

                              70KB

                              MD5

                              49aebf8cbd62d92ac215b2923fb1b9f5

                              SHA1

                              1723be06719828dda65ad804298d0431f6aff976

                              SHA256

                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                              SHA512

                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                            • C:\Users\Admin\AppData\Local\Temp\TarF51.tmp

                              Filesize

                              181KB

                              MD5

                              4ea6026cf93ec6338144661bf1202cd1

                              SHA1

                              a1dec9044f750ad887935a01430bf49322fbdcb7

                              SHA256

                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                              SHA512

                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                            • memory/2156-0-0x00000000743CE000-0x00000000743CF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2156-1-0x0000000001140000-0x000000000120C000-memory.dmp

                              Filesize

                              816KB

                            • memory/2156-2-0x00000000743C0000-0x0000000074AAE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2156-3-0x00000000743C0000-0x0000000074AAE000-memory.dmp

                              Filesize

                              6.9MB