Analysis

  • max time kernel
    21s
  • max time network
    22s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 14:30

Errors

Reason
Machine shutdown

General

  • Target

    BootstrapperV1.26.exe

  • Size

    863KB

  • MD5

    cc3f2a1f63f68e4014bc3b8a0d3ddf7c

  • SHA1

    82eb314b035f073332a7a4a9a10449513ccc1d03

  • SHA256

    43182b7bf6f7d1c9e18f1c3f9dd916986d6adb81928ee0b2e57d6572d22bca4a

  • SHA512

    6f6839fb986475b0b8d95132a5588c9d0f956e8b9cc1d894fc755cc8d365a11daba321a05aac1db295586a4d3a2b290c7ea80446948c57c4af0d33f21dd5f2da

  • SSDEEP

    12288:TATougEx9nCvJ4f05oOGoGH/j0MNVcfzJXcBPXBNr8L5h:k0NY9CvzoVoGH/j0ucrJXOu

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.26.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.26.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Roaming\13131312.exe
      "C:\Users\Admin\AppData\Roaming\13131312.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start shutdown /s /f /t 0
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown /s /f /t 0
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1916
    • C:\Users\Admin\AppData\Roaming\BootstrapperV1.21.exe
      "C:\Users\Admin\AppData\Roaming\BootstrapperV1.21.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Roaming\BootstrapperV1.22.exe
        "C:\Users\Admin\AppData\Roaming\BootstrapperV1.22.exe" --oldBootstrapper "C:\Users\Admin\AppData\Roaming\BootstrapperV1.21.exe" --isUpdate true
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" /c ipconfig /all
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3012
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            5⤵
            • Gathers network information
            PID:4516
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4996
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4212
        • C:\Windows\System32\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2632
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding D214A0A2C7D5C04E76DAD4AB7D6B8C06
      2⤵
      • Loads dropped DLL
      PID:2636
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D1F4BF0F9771C273F5E4593FD86DB2BA
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1356
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 4DD5559A01D94D67647EB07D62EF125E
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4420
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ad855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DISCORD

    Filesize

    103B

    MD5

    487ab53955a5ea101720115f32237a45

    SHA1

    c59d22f8bc8005694505addef88f7968c8d393d3

    SHA256

    d64354a111fd859a08552f6738fecd8c5594475e8c03bb37546812a205d0d368

    SHA512

    468689d98645c9f32813d833a07bbcf96fe0de4593f4f4dc6757501fbce8e9951d21a8aa4a7050a87a904d203f521134328d426d4e6ab9f20e7e759769003b7c

  • C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi

    Filesize

    30.1MB

    MD5

    0e4e9aa41d24221b29b19ba96c1a64d0

    SHA1

    231ade3d5a586c0eb4441c8dbfe9007dc26b2872

    SHA256

    5bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d

    SHA512

    e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913

  • C:\Users\Admin\AppData\Roaming\13131312.exe

    Filesize

    55KB

    MD5

    7f885e0b86bfd37c17867214b74c600a

    SHA1

    476e1749121846a34eff66c2714d01ff3cf18593

    SHA256

    0e598feb9643475cd6209f510b9bdd33080188752734f5e8403aa5e946f6b841

    SHA512

    00799f581f42173a2e10e9fdd4f8ba83922bbe8b8e264539405a78eef146c3c8f8f09ac2fdbb6380d2574232b749e902469bbdc62af89d62d4416de506f75499

  • C:\Users\Admin\AppData\Roaming\BootstrapperV1.21.exe

    Filesize

    797KB

    MD5

    c5dfc6db9d57d21fc1fd18afff38cab0

    SHA1

    2c0ad08b90c699539702899db5860c1e1e1a8d80

    SHA256

    163c5a7bdc1038959e103011dcf454bc009c5b0c0ad3cac60bbb4f2a4a19444f

    SHA512

    0369f636cc83d5841549a06ed1ca06b74859a26ef7ebc35ed9f26c281682e10804fcdaf3dfc47049b4aea01694cc11014d2e2c6435b0abc757a5472c548dd68e

  • C:\Users\Admin\AppData\Roaming\BootstrapperV1.22.exe

    Filesize

    800KB

    MD5

    2a4dcf20b82896be94eb538260c5fb93

    SHA1

    21f232c2fd8132f8677e53258562ad98b455e679

    SHA256

    ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a

    SHA512

    4f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288

  • C:\Windows\Installer\MSIA7AA.tmp

    Filesize

    122KB

    MD5

    9fe9b0ecaea0324ad99036a91db03ebb

    SHA1

    144068c64ec06fc08eadfcca0a014a44b95bb908

    SHA256

    e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9

    SHA512

    906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176

  • C:\Windows\Installer\MSIA7EA.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIB0E5.tmp

    Filesize

    297KB

    MD5

    7a86ce1a899262dd3c1df656bff3fb2c

    SHA1

    33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

    SHA256

    b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

    SHA512

    421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

  • memory/1328-43-0x00007FFDAF2B0000-0x00007FFDAFD71000-memory.dmp

    Filesize

    10.8MB

  • memory/1328-27-0x00007FFDAF2B3000-0x00007FFDAF2B5000-memory.dmp

    Filesize

    8KB

  • memory/1328-28-0x0000018346260000-0x000001834632E000-memory.dmp

    Filesize

    824KB

  • memory/1328-29-0x00007FFDAF2B0000-0x00007FFDAFD71000-memory.dmp

    Filesize

    10.8MB

  • memory/1328-31-0x0000018347F40000-0x0000018347F62000-memory.dmp

    Filesize

    136KB

  • memory/1884-22-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/1884-24-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/1884-48-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/1884-25-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/1884-81-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/2280-23-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/2280-0-0x0000000074BA2000-0x0000000074BA3000-memory.dmp

    Filesize

    4KB

  • memory/2280-2-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/2280-1-0x0000000074BA0000-0x0000000075151000-memory.dmp

    Filesize

    5.7MB

  • memory/4128-45-0x0000014741980000-0x0000014741A4E000-memory.dmp

    Filesize

    824KB