Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 00:13
Behavioral task
behavioral1
Sample
boost tool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
boost tool.exe
Resource
win10v2004-20241007-en
General
-
Target
boost tool.exe
-
Size
11.6MB
-
MD5
9d37471aabf29eaf9427bd8638beca5d
-
SHA1
e547db6c6f8c055e256d2a7aebb6f21b5d17c4ab
-
SHA256
b169d0f2f9a16e284ec681af72379f9841ac1f0bd648681dedffbee9563484c8
-
SHA512
b16e3b3bbaf047f65f021f4fcb3fd3ca768c27d6693631c1245a16d965a6fd2527c54e42ed54dbf631da2b3f163015bbbaeba86bd0f4d6ee6c914da12937b5d4
-
SSDEEP
196608:+WYShE+5vi5HuUYBDfWgtlA5RsO5ne0COshoKMuIkhVastRL5Di3uV1DV+:PYSyT5cSgtS7OOshouIkPftRL54u3+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2676 boost tool.exe -
resource yara_rule behavioral1/files/0x0005000000019214-22.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2676 2432 boost tool.exe 30 PID 2432 wrote to memory of 2676 2432 boost tool.exe 30 PID 2432 wrote to memory of 2676 2432 boost tool.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab