Resubmissions

22-12-2024 11:42

241222-nvcssswqe1 9

22-12-2024 11:37

241222-nrbfkaxjdj 7

22-12-2024 11:36

241222-nqj2bawpbv 7

Analysis

  • max time kernel
    265s
  • max time network
    264s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 11:37

General

  • Target

    Bootstrapper.exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\system32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:2356
    • C:\Windows\system32\cmd.exe
      "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1984 -s 1128
      2⤵
        PID:2332
    • C:\Windows\system32\magnify.exe
      "C:\Windows\system32\magnify.exe"
      1⤵
        PID:3024
      • C:\Windows\system32\utilman.exe
        utilman.exe /debug
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\System32\Magnify.exe
          "C:\Windows\System32\Magnify.exe"
          2⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2644
      • C:\Windows\system32\utilman.exe
        utilman.exe /debug
        1⤵
          PID:1244
        • C:\Windows\System32\control.exe
          "C:\Windows\System32\control.exe" SYSTEM
          1⤵
            PID:1112
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
            1⤵
            • System Location Discovery: System Language Discovery
            PID:692
          • C:\Windows\System32\control.exe
            "C:\Windows\System32\control.exe" SYSTEM
            1⤵
              PID:2464
            • C:\Windows\SysWOW64\DllHost.exe
              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
              1⤵
              • System Location Discovery: System Language Discovery
              PID:2212
            • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
              "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\system32\cmd.exe
                "cmd" /c ipconfig /all
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2472
                • C:\Windows\system32\ipconfig.exe
                  ipconfig /all
                  3⤵
                  • Gathers network information
                  PID:2768
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2748 -s 1092
                2⤵
                  PID:1244
              • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
                "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\system32\cmd.exe
                  "cmd" /c ipconfig /all
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2912
                  • C:\Windows\system32\ipconfig.exe
                    ipconfig /all
                    3⤵
                    • Gathers network information
                    PID:1920
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2904 -s 1084
                  2⤵
                    PID:2992

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1984-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

                  Filesize

                  4KB

                • memory/1984-1-0x0000000000240000-0x000000000030E000-memory.dmp

                  Filesize

                  824KB

                • memory/1984-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1984-3-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

                  Filesize

                  4KB

                • memory/1984-4-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/2748-5-0x00000000002A0000-0x000000000036E000-memory.dmp

                  Filesize

                  824KB

                • memory/2904-6-0x0000000000EE0000-0x0000000000FAE000-memory.dmp

                  Filesize

                  824KB