Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 21:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
BootstrapperV1.13.exe
Resource
win7-20240708-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
BootstrapperV1.13.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
BootstrapperV1.13.exe
-
Size
796KB
-
MD5
fa65805dc79caefec703e1339141fc65
-
SHA1
9f2480739aac09dcf254d87f5f63deaea8296404
-
SHA256
d122b76e0739d706b0c3078136fd05d55e92b09dca92864c66b428fa8c0da748
-
SHA512
b2fd9027cf118727dc5688912a0909403afede90a6efcb5e616dcca575753b82a85ba48f3d08b63148f5c5795d1af35f69803dde2fef358f94dd367ec55f1b63
-
SSDEEP
12288:rhdfHRzSfsqsgun4PoGQfjVBcukly9wQ6alRlZUh:rhdPVSynUoGQfjVauCy9wQ6an
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 2 raw.githubusercontent.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2716 2784 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperV1.13.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 BootstrapperV1.13.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2716 2784 BootstrapperV1.13.exe 31 PID 2784 wrote to memory of 2716 2784 BootstrapperV1.13.exe 31 PID 2784 wrote to memory of 2716 2784 BootstrapperV1.13.exe 31 PID 2784 wrote to memory of 2716 2784 BootstrapperV1.13.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.13.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.13.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 9882⤵
- Program crash
PID:2716
-