Analysis
-
max time kernel
150s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper_1725665491503_7rgx2s.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Bootstrapper_1725665491503_7rgx2s.exe
Resource
win11-20240802-en
General
-
Target
Bootstrapper_1725665491503_7rgx2s.exe
-
Size
10.7MB
-
MD5
6ae74315bdb5b5f757005d23967bcf73
-
SHA1
834c5b96f91e9349ae91ed4cd5cc8897f58a3fdb
-
SHA256
66397977e36190a9f7ca77e93bfceb8e731838e5ce824bcd22222339b007891d
-
SHA512
bf54808fd4ad33d0929868c90fc7b8cf0e9a9ab5c8507d9de676966143b8a9556dadd7ffd7365f3bbc7065ef98b0f75c78267558824df8bea4a358ef52973b77
-
SSDEEP
196608:bQBhQLJcA1nvCB254dzRiZp+0JhLNL6XpDFvZEw5HTjoA+W+72E/inXeBRfmfR+d:bQrQtHvCYIzE+07LNKZB55zjiW+ge7ee
Malware Config
Extracted
lumma
https://chocolatedwq.shop/api
https://condedqpwqm.shop/api
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Bootstrapper_1725665491503_7rgx2s.tmp Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation AutoIt3.exe -
Executes dropped EXE 4 IoCs
pid Process 4452 Bootstrapper_1725665491503_7rgx2s.tmp 5064 Bootstrapper_1725665491503_7rgx2s.tmp 3228 AutoIt3.exe 3132 AutoIt3.exe -
Loads dropped DLL 2 IoCs
pid Process 4452 Bootstrapper_1725665491503_7rgx2s.tmp 5064 Bootstrapper_1725665491503_7rgx2s.tmp -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 852 tasklist.exe 4524 tasklist.exe 1956 tasklist.exe 4012 tasklist.exe 4016 tasklist.exe 2028 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3132 set thread context of 3040 3132 AutoIt3.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4392 3040 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper_1725665491503_7rgx2s.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper_1725665491503_7rgx2s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper_1725665491503_7rgx2s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper_1725665491503_7rgx2s.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3800 cmd.exe 3824 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AutoIt3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AutoIt3.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5064 Bootstrapper_1725665491503_7rgx2s.tmp 5064 Bootstrapper_1725665491503_7rgx2s.tmp -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4016 tasklist.exe Token: SeDebugPrivilege 2028 tasklist.exe Token: SeDebugPrivilege 852 tasklist.exe Token: SeDebugPrivilege 4524 tasklist.exe Token: SeDebugPrivilege 1956 tasklist.exe Token: SeDebugPrivilege 4012 tasklist.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5064 Bootstrapper_1725665491503_7rgx2s.tmp -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4452 4720 Bootstrapper_1725665491503_7rgx2s.exe 85 PID 4720 wrote to memory of 4452 4720 Bootstrapper_1725665491503_7rgx2s.exe 85 PID 4720 wrote to memory of 4452 4720 Bootstrapper_1725665491503_7rgx2s.exe 85 PID 4452 wrote to memory of 3168 4452 Bootstrapper_1725665491503_7rgx2s.tmp 87 PID 4452 wrote to memory of 3168 4452 Bootstrapper_1725665491503_7rgx2s.tmp 87 PID 4452 wrote to memory of 3168 4452 Bootstrapper_1725665491503_7rgx2s.tmp 87 PID 3168 wrote to memory of 5064 3168 Bootstrapper_1725665491503_7rgx2s.exe 88 PID 3168 wrote to memory of 5064 3168 Bootstrapper_1725665491503_7rgx2s.exe 88 PID 3168 wrote to memory of 5064 3168 Bootstrapper_1725665491503_7rgx2s.exe 88 PID 5064 wrote to memory of 3324 5064 Bootstrapper_1725665491503_7rgx2s.tmp 89 PID 5064 wrote to memory of 3324 5064 Bootstrapper_1725665491503_7rgx2s.tmp 89 PID 3324 wrote to memory of 4016 3324 cmd.exe 91 PID 3324 wrote to memory of 4016 3324 cmd.exe 91 PID 3324 wrote to memory of 4888 3324 cmd.exe 92 PID 3324 wrote to memory of 4888 3324 cmd.exe 92 PID 5064 wrote to memory of 3900 5064 Bootstrapper_1725665491503_7rgx2s.tmp 94 PID 5064 wrote to memory of 3900 5064 Bootstrapper_1725665491503_7rgx2s.tmp 94 PID 3900 wrote to memory of 2028 3900 cmd.exe 96 PID 3900 wrote to memory of 2028 3900 cmd.exe 96 PID 3900 wrote to memory of 2972 3900 cmd.exe 97 PID 3900 wrote to memory of 2972 3900 cmd.exe 97 PID 5064 wrote to memory of 2744 5064 Bootstrapper_1725665491503_7rgx2s.tmp 98 PID 5064 wrote to memory of 2744 5064 Bootstrapper_1725665491503_7rgx2s.tmp 98 PID 2744 wrote to memory of 852 2744 cmd.exe 100 PID 2744 wrote to memory of 852 2744 cmd.exe 100 PID 2744 wrote to memory of 1144 2744 cmd.exe 101 PID 2744 wrote to memory of 1144 2744 cmd.exe 101 PID 5064 wrote to memory of 2864 5064 Bootstrapper_1725665491503_7rgx2s.tmp 102 PID 5064 wrote to memory of 2864 5064 Bootstrapper_1725665491503_7rgx2s.tmp 102 PID 2864 wrote to memory of 4524 2864 cmd.exe 104 PID 2864 wrote to memory of 4524 2864 cmd.exe 104 PID 2864 wrote to memory of 4992 2864 cmd.exe 105 PID 2864 wrote to memory of 4992 2864 cmd.exe 105 PID 5064 wrote to memory of 1692 5064 Bootstrapper_1725665491503_7rgx2s.tmp 106 PID 5064 wrote to memory of 1692 5064 Bootstrapper_1725665491503_7rgx2s.tmp 106 PID 1692 wrote to memory of 1956 1692 cmd.exe 108 PID 1692 wrote to memory of 1956 1692 cmd.exe 108 PID 1692 wrote to memory of 1020 1692 cmd.exe 109 PID 1692 wrote to memory of 1020 1692 cmd.exe 109 PID 5064 wrote to memory of 1332 5064 Bootstrapper_1725665491503_7rgx2s.tmp 110 PID 5064 wrote to memory of 1332 5064 Bootstrapper_1725665491503_7rgx2s.tmp 110 PID 1332 wrote to memory of 4012 1332 cmd.exe 112 PID 1332 wrote to memory of 4012 1332 cmd.exe 112 PID 1332 wrote to memory of 4492 1332 cmd.exe 113 PID 1332 wrote to memory of 4492 1332 cmd.exe 113 PID 5064 wrote to memory of 3228 5064 Bootstrapper_1725665491503_7rgx2s.tmp 114 PID 5064 wrote to memory of 3228 5064 Bootstrapper_1725665491503_7rgx2s.tmp 114 PID 5064 wrote to memory of 3228 5064 Bootstrapper_1725665491503_7rgx2s.tmp 114 PID 3228 wrote to memory of 3800 3228 AutoIt3.exe 121 PID 3228 wrote to memory of 3800 3228 AutoIt3.exe 121 PID 3228 wrote to memory of 3800 3228 AutoIt3.exe 121 PID 3800 wrote to memory of 3824 3800 cmd.exe 123 PID 3800 wrote to memory of 3824 3800 cmd.exe 123 PID 3800 wrote to memory of 3824 3800 cmd.exe 123 PID 3800 wrote to memory of 3132 3800 cmd.exe 124 PID 3800 wrote to memory of 3132 3800 cmd.exe 124 PID 3800 wrote to memory of 3132 3800 cmd.exe 124 PID 3132 wrote to memory of 3040 3132 AutoIt3.exe 125 PID 3132 wrote to memory of 3040 3132 AutoIt3.exe 125 PID 3132 wrote to memory of 3040 3132 AutoIt3.exe 125 PID 3132 wrote to memory of 3040 3132 AutoIt3.exe 125 PID 3132 wrote to memory of 3040 3132 AutoIt3.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\is-PLJJO.tmp\Bootstrapper_1725665491503_7rgx2s.tmp"C:\Users\Admin\AppData\Local\Temp\is-PLJJO.tmp\Bootstrapper_1725665491503_7rgx2s.tmp" /SL5="$80062,10256339,804864,C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe" /VERYSILENT /NORESTART3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\is-97J2A.tmp\Bootstrapper_1725665491503_7rgx2s.tmp"C:\Users\Admin\AppData\Local\Temp\is-97J2A.tmp\Bootstrapper_1725665491503_7rgx2s.tmp" /SL5="$80050,10256339,804864,C:\Users\Admin\AppData\Local\Temp\Bootstrapper_1725665491503_7rgx2s.exe" /VERYSILENT /NORESTART4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"6⤵PID:4888
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"6⤵PID:2972
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"6⤵PID:1144
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"6⤵PID:4992
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"6⤵PID:1020
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"6⤵PID:4492
-
-
-
C:\Users\Admin\AppData\Local\nuclear\AutoIt3.exe"C:\Users\Admin\AppData\Local\nuclear\\AutoIt3.exe" "C:\Users\Admin\AppData\Local\nuclear\\braise.a3x"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && AutoIt3.exe C:\ProgramData\\UYrjLfe8.a3x && del C:\ProgramData\\UYrjLfe8.a3x6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.17⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3824
-
-
C:\Users\Admin\AppData\Local\nuclear\AutoIt3.exeAutoIt3.exe C:\ProgramData\\UYrjLfe8.a3x7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 11609⤵
- Program crash
PID:4392
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3040 -ip 30401⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
3.1MB
MD592a8f182782b7676afc20be2333e7677
SHA182d7e177cb3e40add5d01b68f5ae13264afb2df8
SHA256326db8668e61efa37036e9e7e6934b565e4d4af0454c9c3e6a9799191edabbbc
SHA512afedb24077040b81ab761450d4bc1c680862c77291d5c5f9542e5c8cb52d3b0807d3bae02433c3362f88f8bcb5f84dd44d840546f24612e63f35204c2ae69716
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
60KB
MD58e1a70b54af4c2bcc655f944bb833453
SHA1e3364c0bc8bc33dced566816061ce84ca06f0fb4
SHA2568e7a44ea4294d797392441f86aa2090041040c83938ff585bec1f8ccb3b20b29
SHA512f81c34bfd738d7d7ba04a35db243c24b2c980576a756d174ab916710ed06c3f2c09f1a92866d89a6985fd6c874fbb97091e4ab188452173e1e0ff60a1b2416e4
-
Filesize
476KB
MD510e368548939707ba299e05a5a285f7a
SHA10c190ced4b2746d72bed6240fc4414c4a0b22add
SHA25614458c1c57a94145e00116826e6c60e0646a9b62799ecd966b81d957b25dfc90
SHA5121cd819c5a83c7965a8998678ab6675673f881df5cfbe7b10b24b0963954d5e85da42e7507e6fdc1d6b68175063ba600a803a56e50e6aca4a949ede4059fdbcb8