Resubmissions

16/03/2025, 11:20

250316-nfmz8asqw8 6

16/03/2025, 04:27

250316-e2977s1wes 10

16/03/2025, 04:26

250316-e2ndfavmt5 6

Analysis

  • max time kernel
    66s
  • max time network
    45s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16/03/2025, 11:20

General

  • Target

    Bootstrapper.exe

  • Size

    795KB

  • MD5

    365971e549352a15e150b60294ec2e57

  • SHA1

    2932242b427e81b1b4ac8c11fb17793eae0939f7

  • SHA256

    faad2bc8e61b75e595a80ff2b6d150ff8b27187a8ba426cc1e5e38e193ab6d42

  • SHA512

    f7ba1353e880213a6bdf5bd1dfdfd42a0acf4066a540a502e8df8fec8eac7fb80b75aa52e68eca98be3f7701da48eb90758e5b94d72013d3dff05e0aaf27e938

  • SSDEEP

    12288:GYa9sBhIBdCdbX1USoeQDj/VNpA+dZIznBpGTEy:Pa98hIBdjSoeQDj/VNpZdZIznBpg

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:5520
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /0
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3024
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3400
    • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5780
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Roaming\" -an -ai#7zMap9407:98:7zEvent14805
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bootstrapper.exe.log

      Filesize

      847B

      MD5

      ef375f28c91db0202bf7db29c0cbc2ce

      SHA1

      5a3f5d4ec75a468b908c2eb2b9e6f4b1e76c1017

      SHA256

      f4d1c038db378dec10e7e2fc81ccc2e2d4b8132ef0d66905e3625a0b0cbbde5f

      SHA512

      f18141e352fcd253e02cb25fa0cff29ab06dec62bafd5aa80ca48c959d1dba97deae830d01bf521f851a8143b9416747eb170d0cedafa32b59155027c02f244d

    • memory/3024-14-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-16-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-12-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-13-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-7-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-6-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-17-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-5-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-15-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/3024-11-0x00000153A9CC0000-0x00000153A9CC1000-memory.dmp

      Filesize

      4KB

    • memory/5520-2-0x0000000074A20000-0x00000000751D1000-memory.dmp

      Filesize

      7.7MB

    • memory/5520-0-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

      Filesize

      4KB

    • memory/5520-4-0x0000000074A20000-0x00000000751D1000-memory.dmp

      Filesize

      7.7MB

    • memory/5520-3-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

      Filesize

      4KB

    • memory/5520-19-0x0000000074A20000-0x00000000751D1000-memory.dmp

      Filesize

      7.7MB

    • memory/5520-1-0x0000000000030000-0x00000000000FE000-memory.dmp

      Filesize

      824KB