Analysis
-
max time kernel
52s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 13:30
Behavioral task
behavioral1
Sample
Bootstrapper-X64.zip
Resource
win7-20241010-en
General
-
Target
Bootstrapper-X64.zip
-
Size
19.7MB
-
MD5
19c75e4dc3593e6c89412f1d20841c0b
-
SHA1
1f12ac516be615c30d2190d3b432e73741e38f9e
-
SHA256
5a9c5acd50bf5d967338980468c278976edabf05e6410e2ffa760907351843ed
-
SHA512
aedaf33b0c2a1de214e46d7cc7e9b25d277721cfe4b452e486ea12bf04812013c824b8df7424cecf899690199e13fec79d4a4b21ed6ab4a242857e4fa265c7f5
-
SSDEEP
393216:pV3pg94vh9mTYOryK5Sutvc6O5aCsnLYFRYXQ4XHCWDFkm51xgFM:pV3pg96h8hGFIQ5aCsnLYjyQkxxCM
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fastysticke.sbs/api
Extracted
lumma
https://fastysticke.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 3 IoCs
pid Process 3968 Bootstrapper.exe 1976 Bootstrapper.exe 2620 Bootstrapper.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2956 3968 WerFault.exe 85 1012 1976 WerFault.exe 97 4432 2620 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 2668 7zFM.exe Token: 35 2668 7zFM.exe Token: SeSecurityPrivilege 2668 7zFM.exe Token: SeDebugPrivilege 3848 taskmgr.exe Token: SeSystemProfilePrivilege 3848 taskmgr.exe Token: SeCreateGlobalPrivilege 3848 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2668 7zFM.exe 2668 7zFM.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe 3848 taskmgr.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Bootstrapper-X64.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2668
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3636
-
C:\Users\Admin\Desktop\Release\Bootstrapper.exe"C:\Users\Admin\Desktop\Release\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 12442⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3968 -ip 39681⤵PID:3936
-
C:\Users\Admin\Desktop\Release\Bootstrapper.exe"C:\Users\Admin\Desktop\Release\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 11922⤵
- Program crash
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1976 -ip 19761⤵PID:1236
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3848
-
C:\Users\Admin\Desktop\Bootstrapper.exe"C:\Users\Admin\Desktop\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 13042⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2620 -ip 26201⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD58d7657f64c0a9eb78dcc77bd2b5ff3b1
SHA12acfb002778d5c925588a2c7c2be4acdc852a944
SHA2565f38d3c9f06e46c614788cca16d0ebd9327abbe1da9e565f3a60439db535c6b1
SHA5129948d46ecde5e973581d145214237aca0414f9a48035668f39825910df2980d9278e8a6a431983fa5d7f2c47c8bfebdd5bb6676d1829f21751448c1e673a94b8