Resubmissions

22-02-2025 04:36

250222-e77z2axpfy 10

22-02-2025 04:30

250222-e5b5ksymaj 10

22-02-2025 03:57

250222-eh157axrem 10

22-02-2025 03:49

250222-edlvpsxqgl 10

Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-02-2025 04:36

General

  • Target

    BootstrapperNew.exe

  • Size

    534KB

  • MD5

    64fdd7496eddeb222bea9a42fe6ed53d

  • SHA1

    998dcd9b27a2120cc46f0e47d65d29af12944d27

  • SHA256

    c0f57bfe8d8a19483cf6e2cbc7dd6bd0cbe15c60aec3ba13bf1da4ba76470c1b

  • SHA512

    9e7c4401fb3e0cca134087a87b78ba9466182d9678eb6be356edbe52b5337e91dfdf3342b6671092e8215583d425cc696f608cd05d706673be499b928268fe27

  • SSDEEP

    6144:Aa0ScUn4SkuC/Ee0lPYdue6VlWT8b9acd3YduIsan//fnss1OJb50D08I:AxfZ/9axPVle8kssX08I

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Loads dropped DLL 48 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 40 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Users\Admin\AppData\Roaming\System" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Publisher" /tr "C:\Users\Admin\AppData\Roaming\System"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1324
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4092
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Camtasia" /tr "C:\Users\Admin\AppData\Roaming\Windows" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo 5 /tn "Camtasia" /tr "C:\Users\Admin\AppData\Roaming\Windows" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1520
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1156
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1076
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1168
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2460
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1280
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4940
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4528
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3628
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3508
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3540
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1796
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:408
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1312
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4612
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
      2⤵
        PID:4080
        • C:\Windows\system32\schtasks.exe
          SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3012
      • C:\Windows\SYSTEM32\CMD.exe
        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
        2⤵
          PID:2984
          • C:\Windows\system32\schtasks.exe
            SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2176
        • C:\Windows\SYSTEM32\CMD.exe
          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
          2⤵
            PID:1512
            • C:\Windows\system32\schtasks.exe
              SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:3504
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
            2⤵
              PID:3756
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4744
            • C:\Windows\SYSTEM32\CMD.exe
              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
              2⤵
                PID:3372
                • C:\Windows\system32\schtasks.exe
                  SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:4644
              • C:\Windows\SYSTEM32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                2⤵
                  PID:2152
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:3840
                • C:\Windows\SYSTEM32\CMD.exe
                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                  2⤵
                    PID:2664
                    • C:\Windows\system32\schtasks.exe
                      SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2616
                  • C:\Windows\SYSTEM32\CMD.exe
                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                    2⤵
                      PID:1076
                      • C:\Windows\system32\schtasks.exe
                        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                        3⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:4328
                    • C:\Windows\SYSTEM32\CMD.exe
                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                      2⤵
                        PID:1720
                        • C:\Windows\system32\schtasks.exe
                          SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2712
                      • C:\Windows\SYSTEM32\CMD.exe
                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                        2⤵
                          PID:4996
                          • C:\Windows\system32\schtasks.exe
                            SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:3428
                        • C:\Windows\SYSTEM32\CMD.exe
                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                          2⤵
                            PID:4524
                            • C:\Windows\system32\schtasks.exe
                              SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                              3⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:2040
                          • C:\Windows\SYSTEM32\CMD.exe
                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                            2⤵
                              PID:2332
                              • C:\Windows\system32\schtasks.exe
                                SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                3⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:2352
                            • C:\Windows\SYSTEM32\CMD.exe
                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                              2⤵
                                PID:2688
                                • C:\Windows\system32\schtasks.exe
                                  SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2508
                              • C:\Windows\SYSTEM32\CMD.exe
                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                2⤵
                                  PID:4652
                                  • C:\Windows\system32\schtasks.exe
                                    SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3408
                                • C:\Windows\SYSTEM32\CMD.exe
                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                  2⤵
                                    PID:4168
                                    • C:\Windows\system32\schtasks.exe
                                      SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                      3⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2712
                                  • C:\Windows\SYSTEM32\CMD.exe
                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                    2⤵
                                      PID:4804
                                      • C:\Windows\system32\schtasks.exe
                                        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2328
                                    • C:\Windows\SYSTEM32\CMD.exe
                                      "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                      2⤵
                                        PID:4480
                                        • C:\Windows\system32\schtasks.exe
                                          SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                          3⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:5016
                                      • C:\Windows\SYSTEM32\CMD.exe
                                        "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                        2⤵
                                          PID:4512
                                          • C:\Windows\system32\schtasks.exe
                                            SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5068
                                        • C:\Windows\SYSTEM32\CMD.exe
                                          "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                          2⤵
                                            PID:1156
                                            • C:\Windows\system32\schtasks.exe
                                              SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                              3⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2972
                                          • C:\Windows\SYSTEM32\CMD.exe
                                            "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                            2⤵
                                              PID:2352
                                              • C:\Windows\system32\schtasks.exe
                                                SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                                3⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4924
                                            • C:\Windows\SYSTEM32\CMD.exe
                                              "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                              2⤵
                                                PID:4848
                                                • C:\Windows\system32\schtasks.exe
                                                  SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                                  3⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:5012
                                              • C:\Windows\SYSTEM32\CMD.exe
                                                "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                                2⤵
                                                  PID:2968
                                                  • C:\Windows\system32\schtasks.exe
                                                    SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                                    3⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1000
                                                • C:\Windows\SYSTEM32\CMD.exe
                                                  "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                                  2⤵
                                                    PID:1544
                                                    • C:\Windows\system32\schtasks.exe
                                                      SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                                      3⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1008
                                                  • C:\Windows\SYSTEM32\CMD.exe
                                                    "CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST & exit
                                                    2⤵
                                                      PID:3584
                                                      • C:\Windows\system32\schtasks.exe
                                                        SchTaSKs /create /f /sc minute /mo -1 /tn "BootstrapperNew" /tr "C:\Users\Admin\AppData\Roaming\System" /RL HIGHEST
                                                        3⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:1664
                                                  • C:\Windows\system32\wbem\WmiApSrv.exe
                                                    C:\Windows\system32\wbem\WmiApSrv.exe
                                                    1⤵
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2152
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4444
                                                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /n "C:\Users\Admin\Downloads\ExpandProtect.xlt"
                                                    1⤵
                                                    • Loads dropped DLL
                                                    • Checks processor information in registry
                                                    • Enumerates system info in registry
                                                    • Suspicious behavior: AddClipboardFormatListener
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1792

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Windows\xdwd.dll

                                                    Filesize

                                                    136KB

                                                    MD5

                                                    16e5a492c9c6ae34c59683be9c51fa31

                                                    SHA1

                                                    97031b41f5c56f371c28ae0d62a2df7d585adaba

                                                    SHA256

                                                    35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                                                    SHA512

                                                    20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                                                  • memory/1792-630-0x00007FFB68BE0000-0x00007FFB68BF0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-598-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-599-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-675-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-676-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-677-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-674-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-621-0x00007FFB68BE0000-0x00007FFB68BF0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-600-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-601-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1792-597-0x00007FFB6B670000-0x00007FFB6B680000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2588-97-0x000000001D860000-0x000000001D87E000-memory.dmp

                                                    Filesize

                                                    120KB

                                                  • memory/2588-262-0x000000001C310000-0x000000001C388000-memory.dmp

                                                    Filesize

                                                    480KB

                                                  • memory/2588-986-0x000000001BCE0000-0x000000001BCEA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2588-1-0x00000000009A0000-0x0000000000A2A000-memory.dmp

                                                    Filesize

                                                    552KB

                                                  • memory/2588-153-0x000000001BCC0000-0x000000001BCD2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/2588-125-0x00007FFB8A790000-0x00007FFB8B252000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2588-0-0x00007FFB8A793000-0x00007FFB8A795000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2588-2-0x00007FFB8A793000-0x00007FFB8A795000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2588-96-0x000000001BCB0000-0x000000001BCBC000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/2588-95-0x000000001D8C0000-0x000000001D936000-memory.dmp

                                                    Filesize

                                                    472KB

                                                  • memory/2588-35-0x00007FFB8A790000-0x00007FFB8B252000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2588-458-0x000000001C490000-0x000000001C5F2000-memory.dmp

                                                    Filesize

                                                    1.4MB