Analysis

  • max time kernel
    76s
  • max time network
    77s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 11:52

General

  • Target

    Bloxstrap-v2.7.0.exe

  • Size

    10.1MB

  • MD5

    2c752edef5b0aa0962a3e01c4c82a2fa

  • SHA1

    9c3afd1c63f2b0dbdc2dc487709471222d2cb81e

  • SHA256

    891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8

  • SHA512

    04d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe

  • SSDEEP

    98304:TYd5DQd5Dk9Tsed5DogTrBKvGWD3nIOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrT4:Tasx3vG6IObAbN0T

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.7.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Bloxstrap-v2.7.0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    PID:2236
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UnprotectAdd.ods"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2236-0-0x00007FFB9A7CB000-0x00007FFB9A7CC000-memory.dmp

    Filesize

    4KB

  • memory/5112-1-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-3-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-2-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-4-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-5-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-6-0x00007FFBB830D000-0x00007FFBB830E000-memory.dmp

    Filesize

    4KB

  • memory/5112-8-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-7-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-11-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-10-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-9-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB

  • memory/5112-12-0x00007FFB76130000-0x00007FFB76140000-memory.dmp

    Filesize

    64KB

  • memory/5112-13-0x00007FFB76130000-0x00007FFB76140000-memory.dmp

    Filesize

    64KB

  • memory/5112-37-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-36-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-39-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-38-0x00007FFB782F0000-0x00007FFB78300000-memory.dmp

    Filesize

    64KB

  • memory/5112-40-0x00007FFBB8270000-0x00007FFBB8465000-memory.dmp

    Filesize

    2.0MB