Analysis
-
max time kernel
88s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
Bootstrapper.exe
-
Size
796KB
-
MD5
76639ab92661f5c384302899934051ab
-
SHA1
9b33828f8ad3a686ff02b1a4569b8ae38128caed
-
SHA256
6bb9ad960bcc9010db1b9918369bdfc4558f19287b5b6562079c610a28320178
-
SHA512
928e4374c087070f8a6786f9082f05a866751ea877edf9afa23f6941dfc4d6762e1688bbb135788d6286ec324fa117fc60b46fed2f6e3a4ab059465a00f2ebee
-
SSDEEP
12288:THeLH6iTPSE54sgweI9oaQJj3r+piq+77xOZ+eMm:THeLHdTSEeyoaQJj3Spiq+77xd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Bootstrapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 pastebin.com 32 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 Bootstrapper.exe 3988 Bootstrapper.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 3988 Bootstrapper.exe Token: SeShutdownPrivilege 3872 msiexec.exe Token: SeIncreaseQuotaPrivilege 3872 msiexec.exe Token: SeSecurityPrivilege 4812 msiexec.exe Token: SeCreateTokenPrivilege 3872 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3872 msiexec.exe Token: SeLockMemoryPrivilege 3872 msiexec.exe Token: SeIncreaseQuotaPrivilege 3872 msiexec.exe Token: SeMachineAccountPrivilege 3872 msiexec.exe Token: SeTcbPrivilege 3872 msiexec.exe Token: SeSecurityPrivilege 3872 msiexec.exe Token: SeTakeOwnershipPrivilege 3872 msiexec.exe Token: SeLoadDriverPrivilege 3872 msiexec.exe Token: SeSystemProfilePrivilege 3872 msiexec.exe Token: SeSystemtimePrivilege 3872 msiexec.exe Token: SeProfSingleProcessPrivilege 3872 msiexec.exe Token: SeIncBasePriorityPrivilege 3872 msiexec.exe Token: SeCreatePagefilePrivilege 3872 msiexec.exe Token: SeCreatePermanentPrivilege 3872 msiexec.exe Token: SeBackupPrivilege 3872 msiexec.exe Token: SeRestorePrivilege 3872 msiexec.exe Token: SeShutdownPrivilege 3872 msiexec.exe Token: SeDebugPrivilege 3872 msiexec.exe Token: SeAuditPrivilege 3872 msiexec.exe Token: SeSystemEnvironmentPrivilege 3872 msiexec.exe Token: SeChangeNotifyPrivilege 3872 msiexec.exe Token: SeRemoteShutdownPrivilege 3872 msiexec.exe Token: SeUndockPrivilege 3872 msiexec.exe Token: SeSyncAgentPrivilege 3872 msiexec.exe Token: SeEnableDelegationPrivilege 3872 msiexec.exe Token: SeManageVolumePrivilege 3872 msiexec.exe Token: SeImpersonatePrivilege 3872 msiexec.exe Token: SeCreateGlobalPrivilege 3872 msiexec.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3872 3988 Bootstrapper.exe 113 PID 3988 wrote to memory of 3872 3988 Bootstrapper.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5933db88158483857ec87fadc31f763a0
SHA1905871f98ffe817667618834b429abaaf346ec42
SHA25699a5313319954c9761981c5e984c4c3465ea7b8db9d058873b1d6677abe3c0da
SHA512f4f07e84580aba4fd8328e3fcb1e8d23c4ad49f66e6e75a1cf8066728b572a5fd726762c3093a96e42ee428e5bf330f0130c236e7f5bb0df37ef69840b23fdfa