Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper (1).exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Bootstrapper (1).exe
Resource
win10v2004-20240802-en
windows10-2004-x64
17 signatures
150 seconds
General
-
Target
Bootstrapper (1).exe
-
Size
796KB
-
MD5
4b94b989b0fe7bec6311153b309dfe81
-
SHA1
bb50a4bb8a66f0105c5b74f32cd114c672010b22
-
SHA256
7c4283f5e620b2506bcb273f947def4435d95e143ae3067a783fd3adc873a659
-
SHA512
fbbe60cf3e5d028d906e7d444b648f7dff8791c333834db8119e0a950532a75fda2e9bd5948f0b210904667923eb7b2c0176140babc497955d227e7d80fb109d
-
SSDEEP
12288:jHeLH6iTPSE54sgweI9oaQaj3T+piq+77xOZ+eMm:jHeLHdTSEeyoaQaj3apiq+77xd
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2492 Bootstrapper (1).exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2128 2492 Bootstrapper (1).exe 31 PID 2492 wrote to memory of 2128 2492 Bootstrapper (1).exe 31 PID 2492 wrote to memory of 2128 2492 Bootstrapper (1).exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper (1).exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper (1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2492 -s 10762⤵PID:2128
-