Overview
overview
10Static
static
3Вoostrapper.zip
windows7-x64
1Вoostrapper.zip
windows10-2004-x64
1Boostrapper.zip
windows7-x64
1Boostrapper.zip
windows10-2004-x64
1Boostrappe...er.exe
windows7-x64
10Boostrappe...er.exe
windows10-2004-x64
10Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...19.pak
windows7-x64
3Boostrappe...19.pak
windows10-2004-x64
3Boostrappe...es.pak
windows7-x64
3Boostrappe...es.pak
windows10-2004-x64
3Boostrappe...et.pak
windows7-x64
3Boostrappe...et.pak
windows10-2004-x64
3Analysis
-
max time kernel
237s -
max time network
246s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
Вoostrapper.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Вoostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Boostrapper.zip
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Boostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Boostrapper/Bootsrtapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Boostrapper/Bootsrtapper.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win10v2004-20250217-en
General
-
Target
Boostrapper/Web.UI.View/locales/et.pak
-
Size
330KB
-
MD5
054865950b3b9e8312a7f9490268eaca
-
SHA1
28b0176112eddb7af58386b4f8aed4a49b9a2661
-
SHA256
3599e7138a24a31839da877cc9718b9c0c9522437ea93a6222a119080f108d14
-
SHA512
bfc72f19ad1a52c0da82409accb33a27b2844ed29010207268c7d695ad7562a8867a87b70ac50142909b50b81a5c84d6f6a43968353ae7a72bc042aea8cbb59f
-
SSDEEP
6144:GPJXg42WkHwGkDmzZpDM0djry2zuJbT/RcLvihV15Ujc43ceLfLPQu:6JuvymrDbWF15Ujf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2896 2576 cmd.exe 31 PID 2576 wrote to memory of 2896 2576 cmd.exe 31 PID 2576 wrote to memory of 2896 2576 cmd.exe 31 PID 2896 wrote to memory of 2808 2896 rundll32.exe 32 PID 2896 wrote to memory of 2808 2896 rundll32.exe 32 PID 2896 wrote to memory of 2808 2896 rundll32.exe 32 PID 2896 wrote to memory of 2808 2896 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\et.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\et.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\locales\et.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f11bf0f6011eb1e3fd198cc35d2a005f
SHA1d15ff146edca8e687f8a2e77293576a387b24f9b
SHA256f5b07fb679ddd633de1231ec67630b129cbd58a3434c1a0ce0de23ca14cee779
SHA51274ae3edcab840bc84b312c81d5aa20f6d9433ea11d3a52bf9723e9854560adb3d5f3b97ddf43d7198cc21b26fe50c24af6f38576595293f3d33159ebbc11c75f