Overview
overview
4Static
static
1server-booster.zip
windows11-21h2-x64
4server-boo...DME.md
windows11-21h2-x64
3server-boo...g.json
windows11-21h2-x64
3server-boo...ng.txt
windows11-21h2-x64
3server-boo...ns.txt
windows11-21h2-x64
3server-boo...ns.txt
windows11-21h2-x64
3server-boo...es.txt
windows11-21h2-x64
3server-boo...ll.cmd
windows11-21h2-x64
1server-boo...uth.py
windows11-21h2-x64
3server-boo...ain.py
windows11-21h2-x64
3server-boo...le.txt
windows11-21h2-x64
3server-boo...rt.bat
windows11-21h2-x64
1Analysis
-
max time kernel
422s -
max time network
1147s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-12-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
server-booster.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
server-booster/README.md
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
server-booster/config.json
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
server-booster/error_boosting.txt
Resource
win11-20241023-en
Behavioral task
behavioral5
Sample
server-booster/input/1m_tokens.txt
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
server-booster/input/3m_tokens.txt
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
server-booster/input/proxies.txt
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
server-booster/install.cmd
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
server-booster/keyauth.py
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
server-booster/main.py
Resource
win11-20241023-en
Behavioral task
behavioral11
Sample
server-booster/module.txt
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
server-booster/start.bat
Resource
win11-20241007-en
General
-
Target
server-booster/start.bat
-
Size
14B
-
MD5
92a6f2af2e2bf7d6e64b7821f5400d1c
-
SHA1
ee3e35bf31da9e6616c1c6a663fd19b4d745a279
-
SHA256
89b15dd343075c7271ec08f848803709a915526e81831af0a9df53577b5155b5
-
SHA512
57ebb186b961d2e73bfe554f247b53558cd358bba5716578c355a85caf783087495ca15e981bed2c049e4485bb3d5edf413d90b0e16f68ba95bbdc7f26f5b29f
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 816 2460 cmd.exe 79 PID 2460 wrote to memory of 816 2460 cmd.exe 79 PID 2460 wrote to memory of 816 2460 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\server-booster\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exepython main.py2⤵PID:816
-