Analysis
-
max time kernel
300s -
max time network
212s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-01-2025 12:47
Static task
static1
General
-
Target
Bootstrapper-x64.zip
-
Size
19.7MB
-
MD5
3f9dfe9d9b7deacc5f94a4e0628a12aa
-
SHA1
135930e52fa93c99a482f5d2f6bdabff99e07401
-
SHA256
a8149713aacc192a0fa06365219e3616d98cc510e7d592c7dc07a714dda97f63
-
SHA512
8cb1fee3bf7cc964438d3becc53f578b3492d7ac92f1e7b3e74a685e0f17c645e709659df285804b95affd89308133cdd83c6268a18ba56999eeaf2703d32c03
-
SSDEEP
393216:dbtcA2Vfwn7vvWrY+gwGXGR9n01nC9q2iNRMtbkYxVRzj2JGLxo:0pf8GJ3aC9q2iNR8FVFjbLxo
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fastysticke.sbs/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2920 Bootstrapper.exe 3820 Bootstrapper.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3928 2920 WerFault.exe 83 2360 3820 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2956 NOTEPAD.EXE 2656 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3728 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3728 7zFM.exe Token: 35 3728 7zFM.exe Token: SeSecurityPrivilege 3728 7zFM.exe Token: SeSecurityPrivilege 3728 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3728 7zFM.exe 3728 7zFM.exe 3728 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Bootstrapper-x64.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3728
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2956
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4256
-
C:\Users\Admin\Desktop\Bootstrapper\Bootstrapper.exe"C:\Users\Admin\Desktop\Bootstrapper\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 13202⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2920 -ip 29201⤵PID:2344
-
C:\Users\Admin\Desktop\Bootstrapper\Bootstrapper.exe"C:\Users\Admin\Desktop\Bootstrapper\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 13082⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3820 -ip 38201⤵PID:3972
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Bootstrapper\scripts\config.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52aba9c513f3ef55886793c9105c8589a
SHA1b898a950a38731f46c0bea341cca6c82c3f365ea
SHA2565268289f7c6ca304960a400f76362f4a9fee85257cce7746409cca8e0be2cdf3
SHA51268b21a36aa0664609769ee6234da3b0f5adf12794fb2093b6bf84db7347cf6532d1b417aa460921451a84a931c434cb267a78e4741bed29292b688be19245ad2
-
Filesize
14KB
MD5ed2343039779cc7cdc8a9277a072e760
SHA19699bed14d54301c5da801384f99274fd4b83f5c
SHA256cac56aec58c16a817e8aaa556ecc209e14098d23d5fa65949c46c43274ea0af6
SHA512ae9bf172e10b9678f04e94ea7e47b5e60ecc60752124ed7ed686c54a4edc25fc72c662445c1ae57c0de851cf2ccef3e33fb8847d1e84e064e96b1a0c24a5397d
-
Filesize
468KB
MD5280e5a88a0ca4780526770ac5124cfb2
SHA1439586840ced994d6d08a55bb5e2f1543a8a519c
SHA256c1c3b8037092ff7825d6b8bbdff10481c5182911787b7c6d4ecebaabf316b6fb
SHA51270cbd4d537aab89fdf5df0be4e3984a317c0bb4e9fb3619a54c3e44f8dc59969e4ffb5378e9a14137bea4a412baa500f2bbe7b8c1ddbbceab1506e564163535c
-
Filesize
220KB
MD596c673c9e9dedefec5fd5e27284e4f29
SHA11b5865f8998749a1fd61f62e6357d19dedcc9a2c
SHA256d92b9e01e24935e1cc6144734c0b39379edef1e3c06aedbd547dc304e7334d77
SHA5124ac805e8528f1003911960ce317150d186022a30dc31c479a54e1f6adbbf9cbce882da4b46f8cf0991c9e07fb4239f970d07c1538e4d16c79b560b5b272e5b83
-
Filesize
124B
MD53b4bb14e17a60137e3e93c7adac41bcb
SHA1de09ed28df13d9325e816d0c656582a929077876
SHA256bde691c014e6a2527d5ef783d065edf14bcfe83b20c1ff97c22d280633b5287e
SHA512ec76f39b6ab4c6f822a1777c78212d659d86760458da9f050fba48bef12cba054573f25fc96278b49cdb163bed41a157123c01d3897226584cd1b57a653dfb50