Analysis

  • max time kernel
    8s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 22:11

General

  • Target

    B-O-S-T-R-A-P-E-R.exe

  • Size

    1.3MB

  • MD5

    6b2997fc7396a92dba36300b22919eb5

  • SHA1

    668b7686960603f860850fb3b4717bd339557784

  • SHA256

    b3372fca3eb452875f5627f99b6c963684102a0f09f1fefd604f153de24b6ea7

  • SHA512

    6eddc2191c1859e5fe6a0045dc1797ef40e07760430662380c25e760fe45879a1c7f0ffa940154fc37f6c8e6b0017c66ed2b210f897739d6cefba2729764af51

  • SSDEEP

    24576:+zIp4NTME223+C0S1/B8TlsPPU++BoAunC6XtANU0poZslGtZ6GltIF0IU+LB:fdElzp1yTG3h+5uC6qxJQH57ImIJLB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe
    "C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Allow.flv Allow.flv.cmd & Allow.flv.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:884
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:748
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1960
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 114908
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3068
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Regression.flv
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2220
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "alternatively" Greeting
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 114908\Insertion.com + Accepting + Organize + Horizontal + Curriculum + Enclosure + Mn + Lauderdale + Podcast + Drop 114908\Insertion.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Arrow.flv + ..\Approximately.flv + ..\Xi.flv + ..\Webcams.flv + ..\Whore.flv + ..\Strange.flv + ..\Margin.flv + ..\Truck.flv + ..\Bidding.flv + ..\Universal.flv i
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2720
      • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com
        Insertion.com i
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3004
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com

    Filesize

    1KB

    MD5

    a0e238502491e85b1408fc8042e2501a

    SHA1

    d795724c50c66576c814915bf46a91d367483d43

    SHA256

    82887df9d44985057021ccc0bbcd9157383741dafd9be1e4457c8e2289f3b537

    SHA512

    d53176f3ea68f43002d116d14afb150d4543e0966a5c5c2c90762096339810814f7f2f0ba6142e281fd0568b5fdd170495f82e39576230515136c5511869c238

  • C:\Users\Admin\AppData\Local\Temp\114908\i

    Filesize

    648KB

    MD5

    7b3777980e8d42756de1491fb99c9d31

    SHA1

    573f09a294b197979c9923af8afe396a86a5a85e

    SHA256

    4c4dc3c51fe8295d2bc7949f3b398b0fc340a1fa7aabbdb568f4634953187e6d

    SHA512

    fad3fab9378cfd0fe671cc85c0c188db7f4e1a7165d293fea729e045eedc78e4a60aca21742862c9c684e36bfde9e133b97aac442f2359b46f81ba1603f6ad3f

  • C:\Users\Admin\AppData\Local\Temp\Accepting

    Filesize

    149KB

    MD5

    90d689a2efa422f2643165245be77678

    SHA1

    ef5802ea1a4bd251696e40461c36b0c2784ce453

    SHA256

    92ea6616fec195b098ae9b7dd92d953bf665ed47603a97bcbe64f90f6b98f676

    SHA512

    ebeac1e14ce157c92e52d89da04f9b5d41827b9f731ab80e2c83ffe7f4f7882e16e796546b516c6597d2cb9f7cb2b3dfb024e6a685f7ae76798ba4e004d19e4f

  • C:\Users\Admin\AppData\Local\Temp\Allow.flv

    Filesize

    32KB

    MD5

    1b10cefa3784bd9cac99084510034109

    SHA1

    a5a2a5f5ead84ca336454c1f2c75f9026c801bae

    SHA256

    cab267c22a7e1b8f4df5114cde08c6760a6646298673e47d93600d24bf9ff990

    SHA512

    4e66f417c4b65280705e53c71965d027d2ecf67ebcf3ac39a400d88605f22991e273c63e3aff7ca26669f18dfaf952ab54fc86f49e60550345f3a6486ae4898e

  • C:\Users\Admin\AppData\Local\Temp\Approximately.flv

    Filesize

    55KB

    MD5

    458d31c8a822287564abd321126cc4c5

    SHA1

    5caed7e21a0a18641c1bb689696c52f6f8c9a881

    SHA256

    983b1bb269a014859d2b5c93172c29589b3da0edb9794fd108164199d133e2ee

    SHA512

    889d253bef41b6ea6a68665cb4bb6705cb798c4e1299ac8335890018c8f4773fbfbfb68432b4c1597939992d3734d46e021d0a734466214971a892c6f02a3108

  • C:\Users\Admin\AppData\Local\Temp\Arrow.flv

    Filesize

    74KB

    MD5

    5e515b25ec3a768cc47c4b322b9e2082

    SHA1

    32e39abef2c574b73a26875213b4d908aed95ffb

    SHA256

    9da9e122bf87beb6a38ad935010ee77d2919b38568ae848bf17641202397f920

    SHA512

    47956a59b79e1aec3d16a77064f295e936becd921fb915bdaba06d5eb543c818a5a2d50eafbdb077c57c6e3be8826ee3bc6767481f0b4954cde2110369d35c41

  • C:\Users\Admin\AppData\Local\Temp\Bidding.flv

    Filesize

    86KB

    MD5

    7570e7dd9ec2e31753e3a390ed0d63e9

    SHA1

    6f7ef31825832c056f294e6aa7c333d6a96c6e70

    SHA256

    1f87cc6042591f0dbaadd01d95457d211c9e19740d918219a1ef87e1a819596f

    SHA512

    2a3a2961fa5f4b67bf35355b3ef99359756a7749a5a7c69c7d5218f07e79068260abb56ed0c28bd958b2b3de25ebf24077eb75289d1a46104828727b399fc918

  • C:\Users\Admin\AppData\Local\Temp\Curriculum

    Filesize

    81KB

    MD5

    61e96a5c935e7bc7c124cb12eb1f8a4c

    SHA1

    be1e5ed6beda445c424dcee11ce9588fbba27be4

    SHA256

    419e66e3db4d98d4b453fbb4d66ac707bebf7b4e7c5407dcd08e0ddbb81506f1

    SHA512

    64029e500ae133d7e1db3890fe334ef6ccaeaef8b96f6752d0d13ddaa08cf009199aa433ed4c442aab4af35b3fb9ad6d03ac3e8c54e844c6ffe15b410c3a4a2a

  • C:\Users\Admin\AppData\Local\Temp\Drop

    Filesize

    64KB

    MD5

    a013dd222c8ed7e618d714d0d585d540

    SHA1

    57ff0571f99f769f359b0de5325736cfa05cf5fd

    SHA256

    9c6a04a27295ca339cb5ce136533864ea84b8efb99f3131fbf34876487340631

    SHA512

    709595d96aae1278d75283a386da30c4b8c1d7ed81aca6d4dd377b180da9f760558d75e09cb3ab385b87739ede784b5d43189042457bca8c940aa4ac472251fd

  • C:\Users\Admin\AppData\Local\Temp\Enclosure

    Filesize

    125KB

    MD5

    bc6ea59b796248e9081c81f7cc2ecb8c

    SHA1

    aa51857602096b3ef93221c77162c5fbffb72482

    SHA256

    9226a535727b4507c7212d72fce5a66ad7b651324fe92eb4ac2b328bb96f028b

    SHA512

    da5201819f2b458aa4198474c450d9f8a91c5716f8231e728f2dd125a7f6b8081d84e2588afbdbfc4ebabd7a0684f462d409e4f05b7dd83538c6022bd5ef01d2

  • C:\Users\Admin\AppData\Local\Temp\Greeting

    Filesize

    1KB

    MD5

    72508266e8e0d7a42378ec3a84568b14

    SHA1

    315f3c0dbe06a669b5e2c25a7f92f1c4b9411e8a

    SHA256

    8715daf9642cc3c48fad9147212bedf7848795c43d5c12127db9985b7d3b31e7

    SHA512

    4246797585e4ff7b9c377e4cfdfa08903fa0696a43b095e60fab931122e3776bc79d6b3417b4897d0c4ccfd76a0561d2430027ff54064cc6877c2bde941a9e09

  • C:\Users\Admin\AppData\Local\Temp\Horizontal

    Filesize

    79KB

    MD5

    50078c8e0671fd2661d5fa46a1e0f3f6

    SHA1

    7c3b8a33802dd614c50bf5c27af05fc4e731d9f0

    SHA256

    f577bd40a9d049e5d9d2c0de86cd65ee9de8956807bfd2c624115146ad2254d1

    SHA512

    b4a175a085db82d96c9a00959c6bcb29ac1f9de28a9cd031e4954798213ec8c60e6102fbb711a9e5f5d5509dc38d773a0edac52fecf12d0cce1bae0d9bd8f285

  • C:\Users\Admin\AppData\Local\Temp\Lauderdale

    Filesize

    116KB

    MD5

    99dee9f940bb3e39c04a4873c3142aaa

    SHA1

    43fda8baa4444796860b2cec6fddd08b636a5b05

    SHA256

    892ab8830ef76eff0da641897a5c1784be506a67a9092a3d8b9a35a8e686903d

    SHA512

    ae9986ab7b08a5a920885bec7fa165161bf0b4e05d58c2a55868dab07aeea53c1dc0f57abdc0fd33d8ba27169510c4a329b50b87146437f47d3f937fef8a80bd

  • C:\Users\Admin\AppData\Local\Temp\Margin.flv

    Filesize

    53KB

    MD5

    9a5005e249f4476c7b8eadb891d44c35

    SHA1

    053e99c323cceff773e96114d4c10fe37fce2a74

    SHA256

    31fb39a84ec8bb0bd54e1860ed1d89755aba02fb5dd6bfb16078d7c17d4e2d18

    SHA512

    0cc6ded095f531c9ab7718a213bff001b20c64a7fb8f359f3a7279a043b3f99893dc64ea46c981461cd36bdb10f0cadb73d008cf2c31b41e77e3b193261880c2

  • C:\Users\Admin\AppData\Local\Temp\Mn

    Filesize

    80KB

    MD5

    7428b5b6877536b9bef1c2ab734f2b9f

    SHA1

    38101382d687c1004b36567e348a716d9395f6f3

    SHA256

    5caceaa95582a6da5ed70de8d3d1f95af3a5f1b4eb99601d9f83978521139c1a

    SHA512

    b4850bbd5b90320f247f73ad84fc80074bf08ee51c3a4accea4b416c40d9aa7012c776d7e54a6a8d741ab8360eecc0d555e4c964c9911ef4d21f300af49b0316

  • C:\Users\Admin\AppData\Local\Temp\Organize

    Filesize

    102KB

    MD5

    92eb53f7f95bdff4d1df18978ab876d3

    SHA1

    f5358ce5727c9b5bd97bf96def46559cb6eb6506

    SHA256

    8ddaf8f8301378434e2727cf9551a20c00ed6fb7cbf6fd92be37f2ad6684fdde

    SHA512

    81e2bc2c8b0d1aad4e413fe44be95719885de9c34bef9c303005f042f4beadb91eb1836c0c4c3a6c1181549221d3e759714038e9811ba61b6618a62528cc98e3

  • C:\Users\Admin\AppData\Local\Temp\Podcast

    Filesize

    127KB

    MD5

    b61eae46342cad6c27ba12d460315a8e

    SHA1

    9df2790c1a59834149c7d10c138f03ae901e278b

    SHA256

    f27ac8f73cc6d16081cae3e53b9fd0a5122007d175af2256bf15d1aab2e23da4

    SHA512

    478f428af707fbb5918bff5c1479de20cf6481554c204a3d7d8819d7ca7e3474eec36ed55f4654521a5fa8bd613fe417b6f8f41e17ec4743de51355cc695df65

  • C:\Users\Admin\AppData\Local\Temp\Regression.flv

    Filesize

    477KB

    MD5

    93bcaa3fcac99ca480e7c400b9f300cc

    SHA1

    070ea504ff1d5a6c6f55a802661dabec23a38863

    SHA256

    11ebf9bcb0da56dbe22c6a2725619f80100abfe2925bad0e1061c7358bf24bfe

    SHA512

    f27212fac966555ec9969dfa80cdd320041edbe56d69c6e029db60327d8e9eeea87219b77123d548e1f4c75645e105346d53cbf04f54c1cd527c64ed99cf7df9

  • C:\Users\Admin\AppData\Local\Temp\Strange.flv

    Filesize

    98KB

    MD5

    78616300e951fcc6b6fd8095800864c9

    SHA1

    4494ffa79f838827d7409f117e58dcf268dd9f07

    SHA256

    cf526c534adcbef5e6e73373cf7c1acbddb461015feef66f79226537ed27fa4e

    SHA512

    6e62f385a6d229e1cea25278add970ccae21bc242d32de7e997cfbf29026d10db70c545f079c1cd4548c99a0b98d872c1ef759f0de726f519f1a406bb80f1963

  • C:\Users\Admin\AppData\Local\Temp\Truck.flv

    Filesize

    51KB

    MD5

    68c160f7b8a884038fd7242c4d1ded93

    SHA1

    d7243c6344c07a4c9db527f8b91f9c3172c03c7f

    SHA256

    c6995bec7f71c37d663bcd2876127ad117d3736b6ebb1876438abb13b30e7102

    SHA512

    6755297519638a4738db51a76af9b2715eeaf14de77a3b8fff1b3df66b0463db4612adabf34f3e5db37eaee0d0dc8a5deb92cffe02ec7934ce817eac0ac78317

  • C:\Users\Admin\AppData\Local\Temp\Universal.flv

    Filesize

    19KB

    MD5

    1ef476c38ed819ef26f93a0b2c18420c

    SHA1

    20a8d789c62f72769a05a7da8e2e165743103935

    SHA256

    e15901035ceafd7b31a739f8bcbbf3c4148f47ff64f775277baf583c7febd88f

    SHA512

    443aa9548c59b596e5838bcf37632eeaff48501f79feca743411ec087b66b0b64756bbcb7716a671ca0b23931e6833eb5baeebe7dc362d2a172d9b0e986cf9ee

  • C:\Users\Admin\AppData\Local\Temp\Webcams.flv

    Filesize

    78KB

    MD5

    b767c911caba5726f440de19f7cc4975

    SHA1

    1791e211a5f64b89d0ebb7d5848e3ca9f436744a

    SHA256

    6c0aa10701f942a9eedb7bbe2f2e38d6552e43fc4f4ef3556bbf6950b6005b95

    SHA512

    e2193c501eb17bb7057911269f2c86223255f03023487f840c0f586d19cf0731139b51d19a99b949630fa1f7c1b5bf0c76d6ae995abe12a793817d32398771f7

  • C:\Users\Admin\AppData\Local\Temp\Whore.flv

    Filesize

    67KB

    MD5

    5d2ccd9b70d4deefd08fc908675386ec

    SHA1

    2188b9f8cbbadf7557b099b2d11ce380d7009085

    SHA256

    f7fdebae5fc36d1f57ee303aa919b10c41e44c75df3a2afce210406a3b17ecd7

    SHA512

    74d8e063e4b0b4906b42bf8bb9eaab4c36472072f6aa7d0b678edb715188a0d79f51f945a5b9aa83bc1ab4235dd5464435544ec30c337cfff8e563bf4b4123b2

  • C:\Users\Admin\AppData\Local\Temp\Xi.flv

    Filesize

    67KB

    MD5

    987b07e1d456f004b7a35e88ff791984

    SHA1

    75558dabdcf52232580cb195e8200526672afd89

    SHA256

    96c6e11014f52f6997ecaa9e96181b9a01104354ee8307319ecfc944a92af829

    SHA512

    4d21e01276d12f372f9a0c6b3ce8f9c68878ade0e60c575563d0989bd918dd4404e3c8cd04d2d617ecb2bf88e21624437f2e5cb02144c5d92ad68ca1e4e1215d

  • \Users\Admin\AppData\Local\Temp\114908\Insertion.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f