Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win11-20240802-en
General
-
Target
Bootstrapper.exe
-
Size
796KB
-
MD5
653c07b9b5f1b22c84f72c03b0083d18
-
SHA1
54c25b876736011d016dc0ea06a1533365555cc4
-
SHA256
c9d04a3a87fee318ba65f837f40bd2dd2428f25e78bf271207f8b2b02aaa8a06
-
SHA512
b605773fc4fa244f354bb8f51621225e6482751d19bddf747f03f624581bc7ae896ca0e40be91b667aea7a7978a291497a362f9bd65449682e1948938af684f8
-
SSDEEP
12288:wuHbakEAdS7SdsgtNaFoGQ4jEr+xpS1nmkFmZ2ojKU:/HbTHSINooGQ4jESxpS1nmkkK
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3080 Bootstrapper.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe Token: SeShutdownPrivilege 3828 chrome.exe Token: SeCreatePagefilePrivilege 3828 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe 3828 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1532 3828 chrome.exe 95 PID 3828 wrote to memory of 1532 3828 chrome.exe 95 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 2152 3828 chrome.exe 96 PID 3828 wrote to memory of 1764 3828 chrome.exe 97 PID 3828 wrote to memory of 1764 3828 chrome.exe 97 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98 PID 3828 wrote to memory of 3596 3828 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd782fcc40,0x7ffd782fcc4c,0x7ffd782fcc582⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3604,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4484 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3588,i,11728993506672501100,17119440610457558444,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577912ce6ca73490ed0881960413f5038
SHA121157d3da19f88832e50e28d95abb8c7a48db2b3
SHA256260cbc9ccfc3efe0e7f06686c1c3ad4f38d6461c46bbd7a6bc1f9b160cd94892
SHA5129b2da6d8e891d078be003b8d6e3385f1a2ba0d47b3e7fdeeedbaf2d28430f229bfc607b129664f6a26e7e44f05cb04258c05a1a8bf73f053c269a340b1499c7c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5cfb06f03993ec8ce38d89000d10c8676
SHA194c446c65c400f92b0e61a8709cdfb0d7e98cfac
SHA2566fa8ace3250e6570b62500a6798c4848d5c7165253fcb6388654f12f190c710d
SHA51239ba31cab214a99051e41bc1378dc9271d001e6534f38c9f4e1ae0edd0cb9c5f0cbaec7a56e47130c8d5cc508f2827136ac59b591213bb271db7a867f4b80ccd
-
Filesize
8KB
MD568b57a22564b365a6ca0c8b2e04fc8ff
SHA1612c8b20c993ca36f3b25e2d640c87035615783c
SHA256dbe96b9584508ff1b7553c507ce5fdafb08863b77f7f1d5287319cc7b8d8c14d
SHA512a97514c3c3e4da6e78a59bb7f11f41f40d75c02aded7310c0204f2bc22cead3f07c4b86fe799607cd0c854d3434e620b61c870399fac100036ea7f7306d3a9ca
-
Filesize
13KB
MD57debde4fb86d7e5ec7151ef720b9dbd2
SHA1ab6f8bdeca75e44be9c8b2ef361675994631b67e
SHA2563676ca0e98f6b6a3ec54676267229c75034bbbdd92d25f59df1530b40536af9f
SHA5124d7cd6c1492bd9914a6cb09af8e7ff24d1ac8bb6c22820eb82ba76478d88de5b90e319ccd05b109672067a10a402952ebf7b0f2d1e507b5add9609b6ce5adc76
-
Filesize
99KB
MD5fbc278e139be490929295fd3912df51a
SHA1e5e4eec1b494b06056d276f9029aba87df11b41d
SHA2569b9229d65ec9018a592ca2f14015bfbb1b2aa76e06d6af99b8f180e8021e990f
SHA5120b43af5f9027ca4d4de44512e5ac78c22f16f7a0df44da07db887215f11b828255f82612af3bb573319ce56328c126324bd3fec02cefb52caa558c04f681d37d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58