Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperV1.15.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BootstrapperV1.15.exe
Resource
win10v2004-20240802-en
General
-
Target
BootstrapperV1.15.exe
-
Size
796KB
-
MD5
653c07b9b5f1b22c84f72c03b0083d18
-
SHA1
54c25b876736011d016dc0ea06a1533365555cc4
-
SHA256
c9d04a3a87fee318ba65f837f40bd2dd2428f25e78bf271207f8b2b02aaa8a06
-
SHA512
b605773fc4fa244f354bb8f51621225e6482751d19bddf747f03f624581bc7ae896ca0e40be91b667aea7a7978a291497a362f9bd65449682e1948938af684f8
-
SSDEEP
12288:wuHbakEAdS7SdsgtNaFoGQ4jEr+xpS1nmkFmZ2ojKU:/HbTHSINooGQ4jESxpS1nmkkK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133677829342735887" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 716 chrome.exe 716 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2448 BootstrapperV1.15.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe Token: SeCreatePagefilePrivilege 716 chrome.exe Token: SeShutdownPrivilege 716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe 716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 2592 716 chrome.exe 110 PID 716 wrote to memory of 2592 716 chrome.exe 110 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 4192 716 chrome.exe 111 PID 716 wrote to memory of 1868 716 chrome.exe 112 PID 716 wrote to memory of 1868 716 chrome.exe 112 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113 PID 716 wrote to memory of 3568 716 chrome.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.15.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.15.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffde93acc40,0x7ffde93acc4c,0x7ffde93acc582⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5092,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3360,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4716,i,7947401968318177309,2173142596878822299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\26a94228-fce9-4cea-8273-b99237df8f10.tmp
Filesize9KB
MD558e212d408a8a1b150e78c25e2ab5ac8
SHA1be1f99e41800f635f0f17835fa48f7e59b6cb1dd
SHA256486a294afe01c611cbfcf3751c7951c9f4e0b48b4217981d58db3b2d0ca533ca
SHA512f0be3d6ac33905b647a79fdee5a01d86e138b5e47bf2324901749b8eb4ed93cfba49eef1d1b07e8920c0d2906d34d3d5a6e76aea40edcd8bcbd6b6d4db4b04f5
-
Filesize
649B
MD5fe4728c8d2290711239bf60f7bfe8714
SHA1f00e52ae4f5eb67edd3a5a416a560fbcb7f2068c
SHA256935d9ca521af660cddb1872846a724671cd89edc8931247af187776e7e2fddf8
SHA5120ec3b6efc849fe71519dd66546d41e7275bdd476c460849ca4958ab2e2fd80ac51e12c3e8d4f0c94fdf789d942afb2e29112d3b99585efb7dc18acfbace79d22
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD597f659dab96f8ed500eca5b4ee625b14
SHA18a2c2ecc9d83c89d3e7e2d44cdcf053270810f58
SHA25691ff39bda0b1cf91630025cea6b674a1faadb098d32a830db36578385414042e
SHA512e489fc1ef8163465dbcc4af0b65099d0222f044849588fad570f584d9ff404213881542f609bfad12e1204c08c45126151e4e6d50c9eb2bb5b7157305c8c9c45
-
Filesize
9KB
MD5bc111410e78b78689838a3c4453ac3bc
SHA1e7665e701da310451414bbd348cbc4a6c10369be
SHA2564a401a1a218f719556e45809936002beb52ccfd722396989ffd86f1649db72cc
SHA51215bec98e8e348256099a5e9ea150a88e877153cbc6feab1e4f5e63ca3135a6a3a344c5776b3120cd1ab86a73bac68e90085b0b758134ec6cc692ba660b2e95d5
-
Filesize
9KB
MD53fb6b3c4e4f0d5174bd2f50ba8770db3
SHA127ac1d64da3a6269091d5dd23530fb88fb39b3d6
SHA25683902a12897008a38b41ea776b04a619cb1717046e9ba4155ceb9fd707919642
SHA51219892d5aad3694277cd8efd8ca1be6967c201232d4f71e8e3ad9fc89515938b9d1b85ef4f1e06698e89e448901270da57dcb812f95dd3aafda7e2799c1478905
-
Filesize
15KB
MD5017501325db18296e2af30b89dcd4c5f
SHA1128e18546c12871984423f722105bb751cc1c0ee
SHA256b92039920c13a2349f20bf61752cd6c4f2e8615a2c2f98da4bd9a9d2ef9a3113
SHA512a829a78f66e6c664a1b62dc480657282c345be7fc27c303960ede91d0ceedd4230700f46f3eb7b399d7d1c68c79542fcebbd70e5d85ff8aa61cbf7ce50accb36
-
Filesize
99KB
MD5f671c77ee3245eb7163a445705992e1b
SHA14fc52c8bfbf45be0e6a2409eada3b654ae80c428
SHA256fbdef266897102b020dc53c3cdb5d78966ad979785632ccdc75e253c68ea8ac1
SHA5126e4fd3693a76575f1eb923ed3348c8759234f28927eac8be8780a47beb855baf9b0404825bfc0fb62477dc4da0e55ba615128c1752efce280623cf315c64e347
-
Filesize
194KB
MD5624f9d976cdeb3c3d7e48a6b08570d4b
SHA1ec0990be3751b224a0369b381146927eca4605e1
SHA256d1038f181bae6af0638f936376c51b9407368ac9f9a2508257368b25d32391aa
SHA512e992a33c473c63dca6df415fb6ca6a5e21130663f3fc2c94029975c499d95e18ade70f5ae8fa05475223b054c1bc0d97893774cf0510cdb7162cd0adf44c30fd