Analysis

  • max time kernel
    92s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 02:25

General

  • Target

    Bloxstrap.exe

  • Size

    12.1MB

  • MD5

    46295c1d8df5f85c221128c535ea2db3

  • SHA1

    4c73ff010dbd6aa0d8011ed97c26332c4db59c51

  • SHA256

    44c24e0bd6d7c55fa04e6b54af159e81a9a260e42f50886c6f0918d710df4361

  • SHA512

    30eb4c36c154435a99c03c8cd685fb72c458e1877f7d69d4d800df6643bea508faeae90d9e863e18799382bd64b61f029464913e345220062fc7d34aeba0285b

  • SSDEEP

    98304:taM/VGMTsAd5DwasGUsy/vGWD39ALOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTls:taM/V7sisGUv/vGPLObAbN0h

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe
    "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1868-0-0x00007FFB6AE3B000-0x00007FFB6AE3C000-memory.dmp

    Filesize

    4KB

  • memory/1868-1-0x00007FFB6AE3B000-0x00007FFB6AE3C000-memory.dmp

    Filesize

    4KB