Resubmissions
16-09-2024 13:30
240916-qrrtnazfnl 10Analysis
-
max time kernel
1558s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
BoatTuner Fixed-4644-1-0-1705794066.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BoatTuner Fixed-4644-1-0-1705794066.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BoatTuner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
BoatTuner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
readme.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
readme.txt
Resource
win10v2004-20240802-en
General
-
Target
BoatTuner Fixed-4644-1-0-1705794066.zip
-
Size
3KB
-
MD5
cf68c426ab75a4f8c161d664296a5b66
-
SHA1
725e040db642920daebf737de056a7cec37fb6e2
-
SHA256
f459f7494cc498deccb42f8bdfa371ee6e63f354c077f8523391a410af22bd5c
-
SHA512
4be5aa44ea4d418712b2c28b10d513d3e885c6dec3728e6fe86b2ee48251ad24f77778f16f6e06e537d44f99e3a7c72d774f03f8ae49da656d8794a7fa3b3ef5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1960 chrome.exe 1960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe Token: SeShutdownPrivilege 1960 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe 1960 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1048 1960 chrome.exe 32 PID 1960 wrote to memory of 1048 1960 chrome.exe 32 PID 1960 wrote to memory of 1048 1960 chrome.exe 32 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2620 1960 chrome.exe 34 PID 1960 wrote to memory of 2612 1960 chrome.exe 35 PID 1960 wrote to memory of 2612 1960 chrome.exe 35 PID 1960 wrote to memory of 2612 1960 chrome.exe 35 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36 PID 1960 wrote to memory of 2624 1960 chrome.exe 36
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\BoatTuner Fixed-4644-1-0-1705794066.zip"1⤵PID:1968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5bc9758,0x7fef5bc9768,0x7fef5bc97782⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:22⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:22⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1436 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3944 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3732 --field-trial-handle=1320,i,2922519656281385030,305697650712953267,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5927dc920869c6035cb00cdffa5b6e7c8
SHA125526c7ab06de1916c1d997dceb12731dbb23d45
SHA2563cf50bcf694c0a12a17deeee0a54223a37176f35eb0bf70318188e56cabdbb07
SHA5123dd92521b2ab638c054842d6db978f74acacfb79999724fb5c5032893ddddd3a5432c5d0cf878f3a65d863eba28d722c2006003eaa9aa7d067cff78b980618c5
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD55bc8d8c45653f21b0f7d874694a5aed7
SHA1d3d9686dd94f61942e0d67595d437ab44efecbdb
SHA25656efdc9a71e4e19912435c0b6ece776a094a6f9164c1d0a2182f8a40419ec498
SHA51296f852dc32a41787028b6eb65e1e86713e9fd284fff984838cdb711c42327471c8042604a20dec78854bd03e4d8665f24659035391fa97f4802ada4575071f95
-
Filesize
5KB
MD5e8139ca3c3aa44a2123f3287a4b5a58e
SHA14b47730bace6695f5d80d98b72554bbb5c3836f9
SHA256b69d2af070c32d770f6d386ae4b77b50079074319ad9204b26025baacb754385
SHA512a381c11649cd65562c2bfe6542699c94006b6c1f4ed5901b468447041398a559daacc75fec92e91b7929b5dde9eb02e95160c15b2ce62310936c5bef7ef4027c
-
Filesize
5KB
MD585b96e99ecb231ff64b1abf6ee1b2ee1
SHA131b0a77c065b8334ce82741513907b11dbbccc32
SHA256eacad6242b957fd23de6e66a4a8e02cee286fb7f38fcee5c83d1a91ef5e2267f
SHA5127fee3344fa72ea3fab5cceaaa1a83183cc47ceb45fb2421af9acb8e9608b34ea387b61a377ec1079b97a399110e048752ebb36a6c56cd6562eeaee66e31fb517
-
Filesize
5KB
MD551bf2c85e34f3a48d4ef62890f9ab8c4
SHA1d1b55e4a8c0cbb9749ad1d8f8662c0a85c4763ee
SHA25694ba7dc3fd052cf3d2da531e95a8016ccc9f3fadb3738a894389dbd9229634d4
SHA51267482cd6989d3c232d3ba7d44c9ccd49041279869edfaa58f3e68716e2a90f00352739088f586184a922e815276a780499dc2a45791812d7392fab522be8bb4d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
337KB
MD5459a63af17b2caf46b952eb67b3adb48
SHA1fc0f92d14d261ee5f3c3f5fc76c5d8009d46b804
SHA2565e8427daf85579d4f846252957354674c245750cd3e1a7811010a191779080b3
SHA5122d180712bb700ed96b42258b7e817c32a386d3bdd9f1ac384067b844fd87f10083af1664b8b52aad7af0f6899b9b6fd98de0db2000ae83c3940c2b7c52a8a725