Resubmissions
03-09-2024 13:05
240903-qbkemsydla 703-09-2024 13:00
240903-p8zp6aycna 703-09-2024 12:55
240903-p5sgnsxbqj 1003-09-2024 12:53
240903-p4xd8sxbnk 7Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
Boostrapper (11).exe
Resource
win7-20240903-en
General
-
Target
Boostrapper (11).exe
-
Size
49.8MB
-
MD5
cf200855953b43eba651f132da4ecd23
-
SHA1
9bc83e1f6a6b8a9aa7e1224cf62178e236c818e3
-
SHA256
fea7fe27949fb4491ea2cef150613f02e2d14b4437abec7ff3cb10f55d24384f
-
SHA512
2c5f153873e1bd7364a4d9e487bc02aa9de7e8c80ca3e534ac342821174a895e15c637a45781f2a7601e73e3bc710a8602407e6078f4653c717011c7f0e2eced
-
SSDEEP
1572864:dAOQ20j5f7vnZlT5xTivfSyWqrSaclIlm:dAOEjljbT5xentWLkQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2628 Boostrapper (11).exe -
resource yara_rule behavioral1/files/0x000300000002089a-722.dat upx behavioral1/memory/2628-724-0x000007FEF5FC0000-0x000007FEF65A8000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2628 2692 Boostrapper (11).exe 30 PID 2692 wrote to memory of 2628 2692 Boostrapper (11).exe 30 PID 2692 wrote to memory of 2628 2692 Boostrapper (11).exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boostrapper (11).exe"C:\Users\Admin\AppData\Local\Temp\Boostrapper (11).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Boostrapper (11).exe"C:\Users\Admin\AppData\Local\Temp\Boostrapper (11).exe"2⤵
- Loads dropped DLL
PID:2628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54fcf14c7837f8b127156b8a558db0bb2
SHA18de2711d00bef7b5f2dcf8a2c6871fa1db67cf1f
SHA256a67df621a383f4ce5a408e0debe3ebc49ffc766d6a1d6d9a7942120b8ec054dc
SHA5127a6195495b48f66c35b273a2c9d7ff59e96a4180ea8503f31c8b131167c6cdddd8d6fe77388a34096964a73c85eab504281a14ae3d05350cfee5c51d2491cec8