Analysis
-
max time kernel
26s -
max time network
26s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/10/2024, 07:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win10-20240404-en
3 signatures
300 seconds
General
-
Target
Bootstrapper.exe
-
Size
800KB
-
MD5
2a4dcf20b82896be94eb538260c5fb93
-
SHA1
21f232c2fd8132f8677e53258562ad98b455e679
-
SHA256
ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a
-
SHA512
4f1164b2312fb94b7030d6eb6aa9f3502912ffa33505f156443570fc964bfd3bb21ded3cf84092054e07346d2dce83a0907ba33f4ba39ad3fe7a78e836efe288
-
SSDEEP
12288:t0zVvgDNMoWjTmFzAzBocaKjyWtiR1pptHxQ0z:O5vgHWjTwAlocaKjyyItHDz
Score
1/10
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4720 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4584 WMIC.exe Token: SeSecurityPrivilege 4584 WMIC.exe Token: SeTakeOwnershipPrivilege 4584 WMIC.exe Token: SeLoadDriverPrivilege 4584 WMIC.exe Token: SeSystemProfilePrivilege 4584 WMIC.exe Token: SeSystemtimePrivilege 4584 WMIC.exe Token: SeProfSingleProcessPrivilege 4584 WMIC.exe Token: SeIncBasePriorityPrivilege 4584 WMIC.exe Token: SeCreatePagefilePrivilege 4584 WMIC.exe Token: SeBackupPrivilege 4584 WMIC.exe Token: SeRestorePrivilege 4584 WMIC.exe Token: SeShutdownPrivilege 4584 WMIC.exe Token: SeDebugPrivilege 4584 WMIC.exe Token: SeSystemEnvironmentPrivilege 4584 WMIC.exe Token: SeRemoteShutdownPrivilege 4584 WMIC.exe Token: SeUndockPrivilege 4584 WMIC.exe Token: SeManageVolumePrivilege 4584 WMIC.exe Token: 33 4584 WMIC.exe Token: 34 4584 WMIC.exe Token: 35 4584 WMIC.exe Token: 36 4584 WMIC.exe Token: SeIncreaseQuotaPrivilege 4584 WMIC.exe Token: SeSecurityPrivilege 4584 WMIC.exe Token: SeTakeOwnershipPrivilege 4584 WMIC.exe Token: SeLoadDriverPrivilege 4584 WMIC.exe Token: SeSystemProfilePrivilege 4584 WMIC.exe Token: SeSystemtimePrivilege 4584 WMIC.exe Token: SeProfSingleProcessPrivilege 4584 WMIC.exe Token: SeIncBasePriorityPrivilege 4584 WMIC.exe Token: SeCreatePagefilePrivilege 4584 WMIC.exe Token: SeBackupPrivilege 4584 WMIC.exe Token: SeRestorePrivilege 4584 WMIC.exe Token: SeShutdownPrivilege 4584 WMIC.exe Token: SeDebugPrivilege 4584 WMIC.exe Token: SeSystemEnvironmentPrivilege 4584 WMIC.exe Token: SeRemoteShutdownPrivilege 4584 WMIC.exe Token: SeUndockPrivilege 4584 WMIC.exe Token: SeManageVolumePrivilege 4584 WMIC.exe Token: 33 4584 WMIC.exe Token: 34 4584 WMIC.exe Token: 35 4584 WMIC.exe Token: 36 4584 WMIC.exe Token: SeDebugPrivilege 4472 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4472 wrote to memory of 2924 4472 Bootstrapper.exe 76 PID 4472 wrote to memory of 2924 4472 Bootstrapper.exe 76 PID 2924 wrote to memory of 4720 2924 cmd.exe 78 PID 2924 wrote to memory of 4720 2924 cmd.exe 78 PID 4472 wrote to memory of 3852 4472 Bootstrapper.exe 79 PID 4472 wrote to memory of 3852 4472 Bootstrapper.exe 79 PID 3852 wrote to memory of 4584 3852 cmd.exe 81 PID 3852 wrote to memory of 4584 3852 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4720
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\System32\Wbem\WMIC.exewmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-