Resubmissions
22-02-2025 04:36
250222-e77z2axpfy 1022-02-2025 04:30
250222-e5b5ksymaj 1022-02-2025 03:57
250222-eh157axrem 1022-02-2025 03:49
250222-edlvpsxqgl 10Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-02-2025 04:36
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew.exe
Resource
win11-20250217-en
General
-
Target
BootstrapperNew.exe
-
Size
534KB
-
MD5
64fdd7496eddeb222bea9a42fe6ed53d
-
SHA1
998dcd9b27a2120cc46f0e47d65d29af12944d27
-
SHA256
c0f57bfe8d8a19483cf6e2cbc7dd6bd0cbe15c60aec3ba13bf1da4ba76470c1b
-
SHA512
9e7c4401fb3e0cca134087a87b78ba9466182d9678eb6be356edbe52b5337e91dfdf3342b6671092e8215583d425cc696f608cd05d706673be499b928268fe27
-
SSDEEP
6144:Aa0ScUn4SkuC/Ee0lPYdue6VlWT8b9acd3YduIsan//fnss1OJb50D08I:AxfZ/9axPVle8kssX08I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\System" BootstrapperNew.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 48 IoCs
pid Process 4676 Process not Found 4768 Process not Found 2268 Process not Found 3152 Process not Found 2152 WmiApSrv.exe 1756 Process not Found 3724 Process not Found 1568 Process not Found 4288 Process not Found 2400 Process not Found 3816 Process not Found 2524 Process not Found 2120 Process not Found 4468 Process not Found 4080 Process not Found 2552 Process not Found 404 Process not Found 4444 rundll32.exe 3504 Process not Found 1792 Process not Found 1596 Process not Found 5036 Process not Found 1916 Process not Found 2616 Process not Found 2772 Process not Found 5112 Process not Found 408 Process not Found 4020 Process not Found 1792 EXCEL.EXE 1444 Process not Found 3724 Process not Found 4156 Process not Found 1328 Process not Found 4512 Process not Found 2364 Process not Found 3412 Process not Found 4612 Process not Found 1428 Process not Found 5092 Process not Found 1064 Process not Found 4628 Process not Found 1176 Process not Found 2052 Process not Found 4968 Process not Found 3540 Process not Found 3668 Process not Found 1296 Process not Found 5016 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Run\BootstrapperNew = "C:\\Users\\Admin\\AppData\\Roaming\\Windows" BootstrapperNew.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll BootstrapperNew.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 40 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe 3508 schtasks.exe 4644 schtasks.exe 2712 schtasks.exe 2328 schtasks.exe 5016 schtasks.exe 1000 schtasks.exe 3540 schtasks.exe 1664 schtasks.exe 4092 schtasks.exe 408 schtasks.exe 4612 schtasks.exe 3504 schtasks.exe 3428 schtasks.exe 2352 schtasks.exe 2508 schtasks.exe 2712 schtasks.exe 1168 schtasks.exe 5068 schtasks.exe 4924 schtasks.exe 5012 schtasks.exe 1324 schtasks.exe 1280 schtasks.exe 3628 schtasks.exe 1796 schtasks.exe 4744 schtasks.exe 3408 schtasks.exe 1008 schtasks.exe 1156 schtasks.exe 3012 schtasks.exe 4328 schtasks.exe 2040 schtasks.exe 1520 schtasks.exe 1076 schtasks.exe 2176 schtasks.exe 2616 schtasks.exe 4940 schtasks.exe 1312 schtasks.exe 3840 schtasks.exe 2972 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1792 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2588 BootstrapperNew.exe 2152 WmiApSrv.exe 2152 WmiApSrv.exe 4444 rundll32.exe 4444 rundll32.exe 1792 EXCEL.EXE 1792 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2588 BootstrapperNew.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE 1792 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4732 2588 BootstrapperNew.exe 83 PID 2588 wrote to memory of 4732 2588 BootstrapperNew.exe 83 PID 4732 wrote to memory of 1324 4732 CMD.exe 85 PID 4732 wrote to memory of 1324 4732 CMD.exe 85 PID 2588 wrote to memory of 1000 2588 BootstrapperNew.exe 86 PID 2588 wrote to memory of 1000 2588 BootstrapperNew.exe 86 PID 1000 wrote to memory of 4092 1000 CMD.exe 88 PID 1000 wrote to memory of 4092 1000 CMD.exe 88 PID 2588 wrote to memory of 1660 2588 BootstrapperNew.exe 89 PID 2588 wrote to memory of 1660 2588 BootstrapperNew.exe 89 PID 1660 wrote to memory of 1520 1660 CMD.exe 91 PID 1660 wrote to memory of 1520 1660 CMD.exe 91 PID 2588 wrote to memory of 3516 2588 BootstrapperNew.exe 94 PID 2588 wrote to memory of 3516 2588 BootstrapperNew.exe 94 PID 3516 wrote to memory of 1156 3516 CMD.exe 96 PID 3516 wrote to memory of 1156 3516 CMD.exe 96 PID 2588 wrote to memory of 1720 2588 BootstrapperNew.exe 99 PID 2588 wrote to memory of 1720 2588 BootstrapperNew.exe 99 PID 1720 wrote to memory of 1076 1720 CMD.exe 101 PID 1720 wrote to memory of 1076 1720 CMD.exe 101 PID 2588 wrote to memory of 2356 2588 BootstrapperNew.exe 102 PID 2588 wrote to memory of 2356 2588 BootstrapperNew.exe 102 PID 2356 wrote to memory of 1168 2356 CMD.exe 104 PID 2356 wrote to memory of 1168 2356 CMD.exe 104 PID 2588 wrote to memory of 5092 2588 BootstrapperNew.exe 105 PID 2588 wrote to memory of 5092 2588 BootstrapperNew.exe 105 PID 5092 wrote to memory of 2460 5092 CMD.exe 107 PID 5092 wrote to memory of 2460 5092 CMD.exe 107 PID 2588 wrote to memory of 1120 2588 BootstrapperNew.exe 108 PID 2588 wrote to memory of 1120 2588 BootstrapperNew.exe 108 PID 1120 wrote to memory of 1280 1120 CMD.exe 110 PID 1120 wrote to memory of 1280 1120 CMD.exe 110 PID 2588 wrote to memory of 4808 2588 BootstrapperNew.exe 111 PID 2588 wrote to memory of 4808 2588 BootstrapperNew.exe 111 PID 4808 wrote to memory of 4940 4808 CMD.exe 113 PID 4808 wrote to memory of 4940 4808 CMD.exe 113 PID 2588 wrote to memory of 4528 2588 BootstrapperNew.exe 114 PID 2588 wrote to memory of 4528 2588 BootstrapperNew.exe 114 PID 4528 wrote to memory of 3628 4528 CMD.exe 116 PID 4528 wrote to memory of 3628 4528 CMD.exe 116 PID 2588 wrote to memory of 896 2588 BootstrapperNew.exe 117 PID 2588 wrote to memory of 896 2588 BootstrapperNew.exe 117 PID 896 wrote to memory of 3508 896 CMD.exe 119 PID 896 wrote to memory of 3508 896 CMD.exe 119 PID 2588 wrote to memory of 2292 2588 BootstrapperNew.exe 120 PID 2588 wrote to memory of 2292 2588 BootstrapperNew.exe 120 PID 2292 wrote to memory of 3540 2292 CMD.exe 122 PID 2292 wrote to memory of 3540 2292 CMD.exe 122 PID 2588 wrote to memory of 5112 2588 BootstrapperNew.exe 123 PID 2588 wrote to memory of 5112 2588 BootstrapperNew.exe 123 PID 5112 wrote to memory of 1796 5112 CMD.exe 125 PID 5112 wrote to memory of 1796 5112 CMD.exe 125 PID 2588 wrote to memory of 2548 2588 BootstrapperNew.exe 127 PID 2588 wrote to memory of 2548 2588 BootstrapperNew.exe 127 PID 2548 wrote to memory of 408 2548 CMD.exe 129 PID 2548 wrote to memory of 408 2548 CMD.exe 129 PID 2588 wrote to memory of 1032 2588 BootstrapperNew.exe 131 PID 2588 wrote to memory of 1032 2588 BootstrapperNew.exe 131 PID 1032 wrote to memory of 1312 1032 CMD.exe 133 PID 1032 wrote to memory of 1312 1032 CMD.exe 133 PID 2588 wrote to memory of 2300 2588 BootstrapperNew.exe 134 PID 2588 wrote to memory of 2300 2588 BootstrapperNew.exe 134 PID 2300 wrote to memory of 4612 2300 CMD.exe 136 PID 2300 wrote to memory of 4612 2300 CMD.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Users\Admin\AppData\Roaming\System" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Users\Admin\AppData\Roaming\System"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1324
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4092
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Camtasia" /tr "C:\Users\Admin\AppData\Roaming\Windows" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Camtasia" /tr "C:\Users\Admin\AppData\Roaming\Windows" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1156
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1168
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2460
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1280
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4940
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3628
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3508
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3540
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:408
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1312
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4612
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4080
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2984
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:1512
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3504
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:3756
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4744
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:3372
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4644
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2152
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3840
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2664
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:1076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4328
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:1720
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4996
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3428
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4524
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2040
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2332
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2688
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4652
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3408
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4168
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4804
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2328
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4480
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5016
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4512
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:1156
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2972
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2352
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4924
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:4848
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:2968
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1000
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:1544
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1008
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit2⤵PID:3584
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1664
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /n "C:\Users\Admin\Downloads\ExpandProtect.xlt"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6