Analysis
-
max time kernel
87s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
boostware+free+internal.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
boostware+free+internal.rar
Resource
win10v2004-20240802-en
General
-
Target
boostware+free+internal.rar
-
Size
8.1MB
-
MD5
159871c7972633119a9f87aa55f84fcb
-
SHA1
b8c4a1ca48244b5e2ad0f2d4bcaf4b93010a7824
-
SHA256
0762bee9f4ab36d7a673d87b2e8f28c7ae03f462fe519822234867ea6bbd87e6
-
SHA512
d76b26aa92a586cb909d1bb8328ac1c7ddd6420c0dd5d7a58f28dfdc1d8484d37b419022bb9e73a868ab82dbf05bb3a4f5fb20df35902799bdc2af3a2821ed98
-
SSDEEP
196608:xwYmmi4U2P770kH219ZSAQEO53hLOXr9H2Yv3g2H:Opxr2P7e19WRhc9Vv3gs
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2772 2700 cmd.exe 31 PID 2700 wrote to memory of 2772 2700 cmd.exe 31 PID 2700 wrote to memory of 2772 2700 cmd.exe 31 PID 2596 wrote to memory of 2608 2596 chrome.exe 33 PID 2596 wrote to memory of 2608 2596 chrome.exe 33 PID 2596 wrote to memory of 2608 2596 chrome.exe 33 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2632 2596 chrome.exe 35 PID 2596 wrote to memory of 2464 2596 chrome.exe 36 PID 2596 wrote to memory of 2464 2596 chrome.exe 36 PID 2596 wrote to memory of 2464 2596 chrome.exe 36 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37 PID 2596 wrote to memory of 768 2596 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\boostware+free+internal.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\boostware+free+internal.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f09758,0x7fef6f09768,0x7fef6f097782⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:22⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1448 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1576 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:22⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3240 --field-trial-handle=1368,i,3080087902544136011,6654196217908922526,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
987B
MD5375de6c715e6e4f96f3590f437b7f9c9
SHA1f6ac67e35f0abd45c01bf28e9d6b78a65486b113
SHA2569af3ac3d1f8c4d42b85eed5121ad60aca706ddd45716abade9e22588bf973f6f
SHA512d63a37dc39d9f1aeecb62c2c9e5ddd6144e3752087498a74dc975d327889b4ccd6d034823b206b0a1a8b2a8584d59e28695fcbb045fa336864da8d46176d8d59
-
Filesize
5KB
MD52c6658aca398881d1779f1f927c028a3
SHA1e59edaf9319abf8fa35a55116a1cd67a36aa7bd5
SHA2565a72f300ab26f3a47086b1b182b84dc1e2590c0323fc6e4a61035bd533435850
SHA51240ff40a3491d982517a82352ca00a4879e180fe27a6e1bdb9d89ce4d4282366981e97c8eb679c6f12b96c5f3dc12560002a7fa90baf18d214a3d742a6f26c7d1
-
Filesize
5KB
MD505da65f54111a86fef7b4cd08b568123
SHA1e37096a2f1d447f267fefed04908bda78b978e37
SHA256b4e5fb691dfd8ecee1f23977bcabdea7dfa92179f625d778fde41a6c0eb95654
SHA5121c33137b6b3cc7d9be4750798c420ee787082729639d4fe18fcd83c7a00306b6aa35aa9b56f4b335a33abea4a6443fdffba8bb51ea2f1b42807786826ef2b532