Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 18:26
Behavioral task
behavioral1
Sample
BootstrapperV1.13.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
BootstrapperV1.13.exe
-
Size
229KB
-
MD5
224b37147484176752b12af33b9efd96
-
SHA1
d2fbb87ff49e0e80e8585b449fac349688d02f23
-
SHA256
2133a2c5f4a04d8ffe1ea436d035917ad16c50fa011b021c95c71f2660e67033
-
SHA512
e374e69dad1b3ad39887163e6c8cd07a88e36b167b91b0eeb8a5296f7345ea4c97e6e8e009193b321524f5326118900933e4657b0177b702036525d42c508704
-
SSDEEP
6144:9loZM+rIkd8g+EtXHkv/iD4lePZsyVtG/TOMdRYz7b8e1m4i:foZtL+EP8lePZsyVtG/TOMdRYDu
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/1804-1-0x0000000000B40000-0x0000000000B80000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 BootstrapperV1.13.exe