Analysis

  • max time kernel
    98s
  • max time network
    208s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07-12-2024 14:03

General

  • Target

    Bootstraper.exe

  • Size

    71.0MB

  • MD5

    e82c016015eb049019b94fd51ecd6e49

  • SHA1

    bc230a8342944ddb28007baa2bd29cb07b29294e

  • SHA256

    af5852b2f7312ac76fcd4ec798b8aacf7a5338b329664d2a79a6f31619230828

  • SHA512

    4faa37bf5cebc40469379671e6fe88344fcc9df54ac99d7ec179f04aeaa5d805d0a935b43d79747542cfc329e1f1e78d95cbe6db9235f994cc0fdfbb6e156b98

  • SSDEEP

    393216:Hqc1qcLg6WDV34gkpyfVEHqy2I6Sug+FIOMWg6SvbMK1UO9mBX2GWjNYi1M:Kc1qcLgtDV3fq235ghiSjMKny2GWBM

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • GoLang User-Agent 4 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstraper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstraper.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\Bootstraper.exe\""
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\Bootstraper.exe
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4224
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get uuid
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    3eb3833f769dd890afc295b977eab4b4

    SHA1

    e857649b037939602c72ad003e5d3698695f436f

    SHA256

    c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

    SHA512

    c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    663B

    MD5

    d14b37edc3349627d31b7b00d47e06ef

    SHA1

    91bde4ea5020a5f715914ca75420b1b272e56b91

    SHA256

    6a8b0f38d92cca2b65fb34d62dd75813f7d5b278f345b716ac607d700de451b2

    SHA512

    7a7d9e48f6ac4eee0c7b3447648882e54f55cbdca75eb4986003f6424db39563b55ecd2624c5675be75c925c3b2862f53cbb80a4aaef6938eb802cb6e02f2258

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vwanji54.x22.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2180-2-0x00007FFE10413000-0x00007FFE10415000-memory.dmp

    Filesize

    8KB

  • memory/2180-9-0x00000278D7B00000-0x00000278D7B22000-memory.dmp

    Filesize

    136KB

  • memory/2180-13-0x00007FFE10410000-0x00007FFE10ED2000-memory.dmp

    Filesize

    10.8MB

  • memory/2180-14-0x00007FFE10410000-0x00007FFE10ED2000-memory.dmp

    Filesize

    10.8MB

  • memory/2180-29-0x00007FFE10410000-0x00007FFE10ED2000-memory.dmp

    Filesize

    10.8MB