Overview
overview
10Static
static
3Вoostrapper.zip
windows7-x64
1Вoostrapper.zip
windows10-2004-x64
1Boostrapper.zip
windows7-x64
1Boostrapper.zip
windows10-2004-x64
1Boostrappe...er.exe
windows7-x64
10Boostrappe...er.exe
windows10-2004-x64
10Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...af.pak
windows7-x64
3Boostrappe...af.pak
windows10-2004-x64
3Boostrappe...am.pak
windows7-x64
3Boostrappe...am.pak
windows10-2004-x64
3Boostrappe...ar.pak
windows7-x64
3Boostrappe...ar.pak
windows10-2004-x64
3Boostrappe...bg.pak
windows7-x64
3Boostrappe...bg.pak
windows10-2004-x64
3Boostrappe...bn.pak
windows7-x64
3Boostrappe...bn.pak
windows10-2004-x64
3Boostrappe...19.pak
windows7-x64
3Boostrappe...19.pak
windows10-2004-x64
3Boostrappe...es.pak
windows7-x64
3Boostrappe...es.pak
windows10-2004-x64
3Boostrappe...et.pak
windows7-x64
3Boostrappe...et.pak
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
Вoostrapper.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Вoostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Boostrapper.zip
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Boostrapper.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Boostrapper/Bootsrtapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Boostrapper/Bootsrtapper.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Boostrapper/Web.UI.View/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Boostrapper/Web.UI.View/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Boostrapper/Web.UI.View/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Boostrapper/Web.UI.View/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Boostrapper/Web.UI.View/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Boostrapper/Web.UI.View/locales/af.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Boostrapper/Web.UI.View/locales/am.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
Boostrapper/Web.UI.View/locales/ar.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
Boostrapper/Web.UI.View/locales/bg.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Boostrapper/Web.UI.View/locales/bn.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Boostrapper/Web.UI.View/locales/es-419.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Boostrapper/Web.UI.View/locales/es.pak
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Boostrapper/Web.UI.View/locales/et.pak
Resource
win10v2004-20250217-en
General
-
Target
Boostrapper/Web.UI.View/af.pak
-
Size
327KB
-
MD5
c9312ff081e600e5fb4483b46ddd7c23
-
SHA1
1ff05a6a06cc73caf2d7545a3821d90c228ac0af
-
SHA256
b1987cdcbb8d76598422aa1739a246ed6690dc1b211f950fcbf2f040491ed7a8
-
SHA512
20c136b44770aa0e06259687656675a3e14310ea4e8ba214726b216bc1bcad6026267bf0132cbca642c0b5c49293386d0a1bd93ba40e1c33b648ae70416e8898
-
SSDEEP
6144:ZP+kgc+kVWlEvC9Z5D49Em7kLjB6oAYxjYgDbwxesB+xSK1IA3y25tHwDwv22iGe:ZPfclEvC2im4LjB6oAYxjYgDbwAVSK16
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2820 2228 cmd.exe 32 PID 2228 wrote to memory of 2820 2228 cmd.exe 32 PID 2228 wrote to memory of 2820 2228 cmd.exe 32 PID 2820 wrote to memory of 2748 2820 rundll32.exe 33 PID 2820 wrote to memory of 2748 2820 rundll32.exe 33 PID 2820 wrote to memory of 2748 2820 rundll32.exe 33 PID 2820 wrote to memory of 2748 2820 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\af.pak1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\af.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Boostrapper\Web.UI.View\af.pak"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5503ca58ef792f3e754609ba673119618
SHA1e6964f5bc31bbd38c90976d76d2cb24b4e99ad32
SHA256aeb767ff138762e17bd2cf9e4fa027be93a45f7731bd4b990289598a7752ae32
SHA512e2d2f9737c9cf69596f29df4dfc81c80e0b37381b04664ad0dc77a7997127b4c3b2d0654bb5a7e40eb5eeb0120f9df7e3548d3c2e12ae93ca49e5e8e5a4f16a3