Resubmissions
03-08-2024 04:56
240803-fkvxmatfrn 303-08-2024 04:46
240803-feadqstekl 703-08-2024 04:43
240803-fcr6rstdqn 703-08-2024 04:38
240803-e9w1jstdjq 7Analysis
-
max time kernel
25s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
Bootstrapper.exe
-
Size
795KB
-
MD5
365971e549352a15e150b60294ec2e57
-
SHA1
2932242b427e81b1b4ac8c11fb17793eae0939f7
-
SHA256
faad2bc8e61b75e595a80ff2b6d150ff8b27187a8ba426cc1e5e38e193ab6d42
-
SHA512
f7ba1353e880213a6bdf5bd1dfdfd42a0acf4066a540a502e8df8fec8eac7fb80b75aa52e68eca98be3f7701da48eb90758e5b94d72013d3dff05e0aaf27e938
-
SSDEEP
12288:GYa9sBhIBdCdbX1USoeQDj/VNpA+dZIznBpGTEy:Pa98hIBdjSoeQDj/VNpZdZIznBpg
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2720 2012 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2720 2012 Bootstrapper.exe 31 PID 2012 wrote to memory of 2720 2012 Bootstrapper.exe 31 PID 2012 wrote to memory of 2720 2012 Bootstrapper.exe 31 PID 2012 wrote to memory of 2720 2012 Bootstrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 6162⤵
- Program crash
PID:2720
-