Analysis
-
max time kernel
406s -
max time network
563s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Boostrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
Boostrapper.exe
-
Size
42.5MB
-
MD5
86cfc8d06cbfbffa225df3d6f23adaaf
-
SHA1
b60657dc88fadba6332a5185440c6f1b5ee18c4b
-
SHA256
c18455e3abbd0f73c4bc2a8375cbc555c754b64a0c1490be800d56234850ad72
-
SHA512
51016341645f2663a8a69b15d2b3f14f118ae8d88d096635e7b045340cdaf8ca48f7081445134079b9cc042d6427ebe0fbebc10fb609c5209ba9bc2f2d282468
-
SSDEEP
786432:9Z9AOQw0A8yHKyKne72lvosS/CY3MoEJbTiumfSfz+EvbD+0/pW/Zd4jb7:RAOQwzHueQQXKYOxTivfSffvb6SaZGjn
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2412 Boostrapper.exe 2652 Boostrapper.exe 2648 Boostrapper.exe 632 Boostrapper.exe -
Loads dropped DLL 20 IoCs
pid Process 1376 Boostrapper.exe 1632 chrome.exe 2664 chrome.exe 1688 chrome.exe 2652 Boostrapper.exe 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 1236 Process not Found 632 Boostrapper.exe -
resource yara_rule behavioral1/files/0x000500000001c863-128.dat upx behavioral1/memory/2652-693-0x000007FEF2A50000-0x000007FEF3038000-memory.dmp upx behavioral1/memory/2652-716-0x000007FEF2A50000-0x000007FEF3038000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 Boostrapper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe Token: SeShutdownPrivilege 1688 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1376 632 Boostrapper.exe 30 PID 632 wrote to memory of 1376 632 Boostrapper.exe 30 PID 632 wrote to memory of 1376 632 Boostrapper.exe 30 PID 1688 wrote to memory of 1824 1688 chrome.exe 40 PID 1688 wrote to memory of 1824 1688 chrome.exe 40 PID 1688 wrote to memory of 1824 1688 chrome.exe 40 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1592 1688 chrome.exe 42 PID 1688 wrote to memory of 1500 1688 chrome.exe 43 PID 1688 wrote to memory of 1500 1688 chrome.exe 43 PID 1688 wrote to memory of 1500 1688 chrome.exe 43 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 PID 1688 wrote to memory of 2296 1688 chrome.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"2⤵
- Loads dropped DLL
PID:1376
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2808
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4da9758,0x7fef4da9768,0x7fef4da97782⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:22⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2340 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2372 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1252 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:22⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1420 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3632 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3552 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2432 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3816 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=756 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3920 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3976 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=584 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3872 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵
- Loads dropped DLL
PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3404 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵
- Loads dropped DLL
PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:82⤵PID:1204
-
-
C:\Users\Admin\Downloads\Boostrapper.exe"C:\Users\Admin\Downloads\Boostrapper.exe"2⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\Downloads\Boostrapper.exe"C:\Users\Admin\Downloads\Boostrapper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=2440 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3180 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=768 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=3760 --field-trial-handle=1216,i,5641955929731832790,8091592135121004958,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1076
-
C:\Users\Admin\Downloads\Boostrapper.exe"C:\Users\Admin\Downloads\Boostrapper.exe"1⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\Downloads\Boostrapper.exe"C:\Users\Admin\Downloads\Boostrapper.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59176eff1f511400645a50d9a1097b655
SHA111cc18cc3baae30fb8fffd47576fadb28d77a792
SHA25657f08cfac06385bc07162b61c00e9a23f58372a0ce24c748d4569fe9c500cf6b
SHA5121c62dda719b29527931a4fe2f2b0e7ee4ba399c16f56957936ac8c853335495ed9466ffc1e6189ed2fa2621e2422564ccd334dda015087e590a2ccb8942ed07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0234d0e1d70e460531fa5778735d2d
SHA12d2f388f0bface0357704dd7866bfae912cb2aa4
SHA256be0fbae8265338d9268b8d1176449bda8ea9ffbf4bd34ea28022f1972ebcce56
SHA5128384ee24e75921344cc6701cf7449bc9f39fe00ec8b000aa7399d0c9afd550ad63c9f8a1a04cf1a060875b139e671b082f033f8c6cdaf5cfee827976e11b9370
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
280B
MD51d3cb6a3acb41a08f6f62a86af8a17c9
SHA1a8f7a0f7f01d2fd5b70f351d81fe6cfbdf49bbc6
SHA256a21432a5c1970a004d8c28ca754ad499af8dbe0e85cfdd0bb6838024da19075d
SHA512ddc493725bddc2edffa8de9577991c660e0e0a54b8556501f6cf7022aa3db66c666c5c08fd3de48a4aa601dc04eb36bb1565ae1bf0eaf5ad8e100d2943216088
-
Filesize
19KB
MD5cada6e570cc26a83baa623d3ad359e1b
SHA14f862640c9ebf0c5533a6ec9af2c9956f2ebd801
SHA256abee6e826d77f26a8e4afbc1a9715cffe84d54581860ef243cc7da72fe40ce84
SHA5122a32425733810cca07440b594cd8ca5e8b26bb9ab6d3e7c78a0233e8d3216aae6d58bd3e7611a144565053629612671e3b54e471392f59f979489093e8ba0462
-
Filesize
192B
MD521a447614e4ce22b3db3244f33d233f8
SHA1852acf1246bd410071205df5bd554ea72c9fbcb1
SHA25687320e56076087c7c07be19ddb4c2a1356e533f88d66e61d73c5d485c169c69b
SHA512223345eeda873e6d39186d86843a600ab7f0b0c3fecf1dadfc486dcdf5f1a76bfe9704786679ce694a274ab7925417f523d1ca4a5016b1f0061e7e23d279b8ec
-
Filesize
192B
MD529d06a4db45ff89334e870060e24b51d
SHA18b7a58625708e7d036ec67c826597f1094af2dd8
SHA25680b0793976c64b92a042324b3a93663412a1be76360ce0d7144221508f0f1d1b
SHA512d5bd076c53a813fb778b1f6748c74349dc5da04a2511d0a36c68ffb95eed996de10e8d8165f8f0e33f2132d9526f2f27ce5571f6dcca8ecb0b781a0ac448e5b4
-
Filesize
72B
MD5906fec9a1312be1caf62e3e388126b77
SHA190201bf05ea7f65d8a8ca35cf0b6662575dd8056
SHA256831b9bacf205a38631857d071b259cf5d195b4892232662522518f44e9b98db6
SHA512cd6f63e0d9b0aff24328e781f6e30346770dfb19727e76ccc7d7ed7baf6693d6876366982f9a6f10fef809a66280edb1a4de7bdc3976bf36498a8d06eb9522dd
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
2KB
MD5bef57f6f3299821bdcaa068411014898
SHA1416b337c96d93a7986300c7452bdf1673f6a1663
SHA25620559950e91134badc93521593b66d5f23672479ba1792e82f158d09fefd5bf3
SHA5120141e592049806706f8c5bd082887f51eecf8990f50825043b878524e36f8748ffd032bd097637dd73dc842fb98c120fe191cf25e8231789c41dedf8411a8377
-
Filesize
1KB
MD5f25640f6cf406cfc24aa337a2d7c177d
SHA1fb41c71759d26ac279380a6c7993c8934c16b6ec
SHA25662387e5e653b673a7db8783253bfa928e66886ebc44155f39d62c21a5db12b74
SHA5128de7d5a5208e285a59574a63f1ee435bd3b20bdd7ae8619b23511943ed2fcf03c3fb3ce7be06feaac8d00af5fb9758cc016431cb9558146171db043b20324ae7
-
Filesize
3KB
MD5ef2289e521f822fcc3a3ffd3739a8a01
SHA1fd21495ebecffcb50b13ca8e3312e834602b246c
SHA2567c46e494c4dd1a465d811a0241f7360e79e8fa2036ad432d15978ca97a038f80
SHA512d4d5af19c74f24c8e11f9fc1652719037024a85157042513a7a3788cc4423aa559936977287d022f70fee224f20bb005318a61232c0cd099d5f12327898b5256
-
Filesize
1KB
MD58aaff704355a9db4fd6fc15d9e8a1c03
SHA135fd05da398027a33bb7faf8a574170a43ba4e4c
SHA25687687f55a6e7b3d211e01cad31a77d637bb99ab1ecaff6ded05e17fc8def6fbd
SHA51245eb644ca62a791d25686c600abe582e9995d7fae48196c81a73f72366c89d475594c0b8cd951b5075acf35fd7b2943a57646401d6098d88215a4a779c7f7dd9
-
Filesize
524B
MD550bbd478a111dfacc122204b6df49e6c
SHA190cd17941a1d5a90cc41ca68f407d6654918d0b6
SHA256305bfd5b54cd33198a06b5c3d000c01cf36d60c39da7426dc791f9b26b9571f3
SHA5124a5562e1bfb17da639d38a2b70d85dcbc03dc88ce2b54ad28c8597cbb14c87e53d64028fdc8ac38a200431ca4cf8c8c61777f8945a25e3f553a93d4d64084daa
-
Filesize
526B
MD5a48688a91c2b547025322ba1f74dbdfb
SHA123b604742919a55022c3f7ea8f24c5e83b0e9cdd
SHA256f7fa99cb3934c259fa414e754fc18de28629b231b5aa51d2e3f68006bcd30645
SHA512cba0eb11b240e56a4b1bdfc649b813f94a9f5995c303688fcc80889e4163f6e86763bdd1861c27814e547b528b8a416b5b09a2c530f30eb67bd50751577d3edb
-
Filesize
524B
MD5b60f92bb4a87fc183ad6d00e611b8b95
SHA1bed63ba49e4c68d7bc8c335ef072e2ab3df95795
SHA2564a4d4a4f3500a837d2229ee949d3784bdd312419558489bb04a5eaf66d9c864f
SHA5123c5d0efad2a11b00d99699d62655a6d7ad9dc00c1b32872a798885f217e3cef00c4ac3955f6a1a901e2f44e410d33135d44783009df5bea4e3a3b2551a70ce3b
-
Filesize
363B
MD5090f84abd404ab3aa11b667fc5efcd6d
SHA1bb492d048c367abb4bcbae9464b5efb8077efad6
SHA256947acb2ba494b0285b81e78c0e2f8c7ce8f7f9e358e626648d662c16977889e5
SHA512b926ea4fe209356ac85fb574abab1aeeb90cdafbdc06eeb0b5f64ad2845905cb7843c371deb805c47bb689bb65d5a9431844d450dfac251c7aec31280d98a35e
-
Filesize
6KB
MD5a166fcf96064bd1af3c52cdcc0eb1457
SHA11b320f9f019758e5642a3e456ff6b9d81f239446
SHA256db3786099c914f4178d7a7af9eb52c7f4fe9819f65e0937f3416c88208103873
SHA51277ef4dc5a937ee77bfc5056a770b5200cba662ef65fc943f22be0162f0faf72f3e8fea80148e9ddb158cef63eef008707a4a38484b3ab32ae660e42743f8e210
-
Filesize
6KB
MD5f744a1e1ac3408aff6073464530c5aba
SHA1eb49ebf8fe40816f0a8525f209f6ea1a9e98b70f
SHA2563c2a7966af3f77a77915e6d1a0e481b6e949c048f5456c99e991cd964b38bd60
SHA5126c3cbc1bb61315a5aec1fd66742b7970ba060b01da6a88f6530a291ff85264d8c2c2176dec4af33ea413c866666fa8a421787234b82d817c778fbe24fa2889f5
-
Filesize
7KB
MD5045b4ddd6483ac32634ca44664ae9522
SHA1eac7e97f112b3e88f4ef1697dd144b6a702d8417
SHA256c0fc1987bb40923e6ccd8310c3d9153aa52c515f86ee40ca9d12a32cb0b39294
SHA51250b3b6524565709a173b4705d2e5505253b4d5ff583fc9fd5183640a708114571659f7401e5ee2a6cddac587320f827a6d80169b3d6f74444f283268925848de
-
Filesize
7KB
MD59a496900e48b09b0afdaa2484d1a7133
SHA1d7bd864414fcc0be176eac5b8c984845dad20ca8
SHA256b2370f9f335838190eb3e844f309ae7566f89b6b61933b2a1c8c424845424b13
SHA512a5806f4729adb8fc13b8532d4076bef0a155de2ad2fb2f0eb9c9be953ea1589d040f193553f4507a0259b3ded5c44ee67cfbd58ce1ea2f7c9fda4c86f215af5f
-
Filesize
5KB
MD5c9c7bab25883ace387fb446ea9908891
SHA1396f253a5c4128e1eb94adacacdb2f237755f412
SHA256da2ae0609842452f250ef874dc0e54b5e6c753df2480054bc256364775dfb744
SHA5128a150d9dd52664511bd7345ac344726c9bfa9197a1b492ea0dbb565971066e32e290c2b1a9573bd6a4b54929c73ab5ec6a093e0edb123b9d6c1d8043ba6f2443
-
Filesize
6KB
MD542b89003d1e948ab545ff6a330e6d728
SHA189952ac5dc58faf85d6a0ea1ab7916c3b2caf6df
SHA2569918e9de416f1d8f27a1705f9851c962cd4e191e288dc296192692ceec56696b
SHA512c7683891799c51f6e2fbc7100e5e57af67ec701c676314930bb5bf33c076271cf7958e3bdc42f59fe3c9f63adde461bff2db72ac6f710bf7ac4a2aa6af3cf013
-
Filesize
6KB
MD57e2f79272992d297fe44976b8d1d5fcf
SHA197fc195a176f68df68526dd34b39cea6a9d3cc3a
SHA25690840273640e8cca7856179a7615b50e0b6f2331779d5b9d08e15cbcff47e878
SHA5126413895fc4e44b936fa7ab78cbe3ac9a9f1b74cfd2a70b10ff8372bb9adec0af43fc957716beea36b6d0ead79b1e29b25fe0fd972637bf9cab73d08c85e152b6
-
Filesize
5KB
MD5c57ca956cd8480da9704a9d0c786d8ce
SHA16092bef88cfe16217ff44878afe367617a801b87
SHA256f23ea540aa318c6de315dfc93e99f27a9908d6685d0a392e476a19b864d1dd6d
SHA512b64b8159f7894ac13a3cd0060a35482a3b8345551b52da78735c7b19d6f0a132d8ef6277f3f6ffb399098fb3f5a9f09b889e1dd41d15868a864f80842dc95a0c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
335KB
MD5eddbfcfb96da5152cb728ad8fab3835a
SHA1b4596cfb6a1705e482896763968ba144f5ec56b0
SHA2563f0daa0e9198ae351cba78a10467d7d17597d306127160bf99ce3029883a9318
SHA51280224d74eef20cab9043f4673f118b9929acaf934fa568e935a58218bf46d168d1cb3c160d8e98218fb3c5bddaa2da81e03da036a4e85d9d73440abce9b8215c
-
Filesize
82KB
MD56cced1cc7b3185764103c6c908f918fd
SHA10c28e1422f81eb71b4ca7a07f0faca5e4fd38e36
SHA256232b16df414233124da5f19090f3296f45c49915ee09167ffc89aef3df75d9e0
SHA512b2ea8464030296d124013d3ec3f51afce53b47ac3c4cadc31fe5fe4d989f703eba6056b7d2a559b41a2559a256006766dcfb368790abc550c94e7708a4bc3d0d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1.6MB
MD54fcf14c7837f8b127156b8a558db0bb2
SHA18de2711d00bef7b5f2dcf8a2c6871fa1db67cf1f
SHA256a67df621a383f4ce5a408e0debe3ebc49ffc766d6a1d6d9a7942120b8ec054dc
SHA5127a6195495b48f66c35b273a2c9d7ff59e96a4180ea8503f31c8b131167c6cdddd8d6fe77388a34096964a73c85eab504281a14ae3d05350cfee5c51d2491cec8
-
Filesize
42.5MB
MD586cfc8d06cbfbffa225df3d6f23adaaf
SHA1b60657dc88fadba6332a5185440c6f1b5ee18c4b
SHA256c18455e3abbd0f73c4bc2a8375cbc555c754b64a0c1490be800d56234850ad72
SHA51251016341645f2663a8a69b15d2b3f14f118ae8d88d096635e7b045340cdaf8ca48f7081445134079b9cc042d6427ebe0fbebc10fb609c5209ba9bc2f2d282468