Overview
overview
10Static
static
3Вoostrapper.zip
windows7-x64
1Вoostrapper.zip
windows10-2004-x64
1Boostrapper.zip
windows7-x64
1Boostrapper.zip
windows10-2004-x64
1Boostrappe...er.exe
windows7-x64
10Boostrappe...er.exe
windows10-2004-x64
10Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...19.pak
windows7-x64
3Boostrappe...19.pak
windows10-2004-x64
3Boostrappe...es.pak
windows7-x64
3Boostrappe...es.pak
windows10-2004-x64
3Boostrappe...et.pak
windows7-x64
3Boostrappe...et.pak
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
Вoostrapper.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Вoostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Boostrapper.zip
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Boostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Boostrapper/Bootsrtapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Boostrapper/Bootsrtapper.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win10v2004-20250217-en
General
-
Target
Boostrapper/Web.UI.View/locales/af.pak
-
Size
327KB
-
MD5
c9312ff081e600e5fb4483b46ddd7c23
-
SHA1
1ff05a6a06cc73caf2d7545a3821d90c228ac0af
-
SHA256
b1987cdcbb8d76598422aa1739a246ed6690dc1b211f950fcbf2f040491ed7a8
-
SHA512
20c136b44770aa0e06259687656675a3e14310ea4e8ba214726b216bc1bcad6026267bf0132cbca642c0b5c49293386d0a1bd93ba40e1c33b648ae70416e8898
-
SSDEEP
6144:ZP+kgc+kVWlEvC9Z5D49Em7kLjB6oAYxjYgDbwxesB+xSK1IA3y25tHwDwv22iGe:ZPfclEvC2im4LjB6oAYxjYgDbwAVSK16
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2452 wrote to memory of 336 2452 cmd.exe 31 PID 2452 wrote to memory of 336 2452 cmd.exe 31 PID 2452 wrote to memory of 336 2452 cmd.exe 31 PID 336 wrote to memory of 2868 336 rundll32.exe 33 PID 336 wrote to memory of 2868 336 rundll32.exe 33 PID 336 wrote to memory of 2868 336 rundll32.exe 33 PID 336 wrote to memory of 2868 336 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\af.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\af.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\af.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55d762c92e85155097d409e2a30f26707
SHA1d3c11c573d53c6adc24dbb9f49e90a2d0ddd79db
SHA2567c6a8e1f22dc7bb88307a7acbaecd49081edff139ad4d69734eba88591ba029b
SHA512f0e369aef8d4a98f0c00b21ba7b3be440902c08edc7525647dfad9e01568dcb37f1a6a985096cb959db1de8c2f3d8af0f917df24b083cdce9445b4230bae0741