Analysis
-
max time kernel
1558s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 21:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
chimeraagilenetdefense_evasiondiscoveryexploitmacromacro_on_actionpersistenceprivilege_escalationpyinstallerransomwarespywarestealer
windows10-2004-x64
51 signatures
1800 seconds
General
-
Target
Bootstrapper.exe
-
Size
795KB
-
MD5
a7f3293b177a63f6c50b5560e729cbff
-
SHA1
4885073e4881cffc5c5155de720aa65755418fe8
-
SHA256
da17868f107954124c0953fd1cb37ac8ed4e78460905e83d6402b966a77ee7dc
-
SHA512
70b3431b238457a24e66914d0059e7e8e2dc4f79ac49c9a9c510214b8bc1279af6947288442060ac02c3cf3c863c144ef95219006097d2e59183586f7f701438
-
SSDEEP
12288:Hs0xF36Z1LyI6QQsJNOoRQ1jt/Nppxu29CHWzO:xxJ6Z1L5J8oRQ1jt/Nppxv9C2
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2204 2964 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2204 2964 Bootstrapper.exe 31 PID 2964 wrote to memory of 2204 2964 Bootstrapper.exe 31 PID 2964 wrote to memory of 2204 2964 Bootstrapper.exe 31 PID 2964 wrote to memory of 2204 2964 Bootstrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 6162⤵
- Program crash
PID:2204
-