Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 19:53
Behavioral task
behavioral1
Sample
DriverBOoster.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DriverBOoster.exe
Resource
win10v2004-20250314-en
General
-
Target
DriverBOoster.exe
-
Size
6.9MB
-
MD5
5d1d84f92a3d9206049786bfa1905b63
-
SHA1
b439c0f3f9019b995ec8310151d0da4608484dc9
-
SHA256
375198a1049837186a4ba1d26d14c92a779991f836ea9234c56f8f7565dfe845
-
SHA512
a2f321eef5b37ea15b14fd5d58b4d220232ae0a6307818fe1e28c0c508f4ca261d9de6e92fba5096aee94bc4b6d3d856946a0f80ee63e1d11d0d5d0d790d0578
-
SSDEEP
98304:oW0DjWM8JEcuNX7amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIh:oW00VCOeNTfm/pf+xk4dWRimrbW3jmyU
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2812 DriverBOoster.exe -
resource yara_rule behavioral1/files/0x000500000001944d-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2812 2904 DriverBOoster.exe 30 PID 2904 wrote to memory of 2812 2904 DriverBOoster.exe 30 PID 2904 wrote to memory of 2812 2904 DriverBOoster.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriverBOoster.exe"C:\Users\Admin\AppData\Local\Temp\DriverBOoster.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\DriverBOoster.exe"C:\Users\Admin\AppData\Local\Temp\DriverBOoster.exe"2⤵
- Loads dropped DLL
PID:2812
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31