Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bootstrapper.exe

Overview

General Information

Sample name:Bootstrapper.exe
Analysis ID:1575267
MD5:02c70d9d6696950c198db93b7f6a835e
SHA1:30231a467a49cc37768eea0f55f4bea1cbfb48e2
SHA256:8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Uses ipconfig to lookup or modify the Windows network settings
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64_ra
  • Bootstrapper.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\Bootstrapper.exe" MD5: 02C70D9D6696950C198DB93B7F6A835E)
    • conhost.exe (PID: 6928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7040 cmdline: "cmd" /c ipconfig /all MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 7096 cmdline: ipconfig /all MD5: 62F170FB07FDBB79CEB7147101406EB8)
    • WerFault.exe (PID: 3760 cmdline: C:\Windows\system32\WerFault.exe -u -p 6920 -s 2128 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
SourceRuleDescriptionAuthorStrings
\Device\ConDrvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Source: Process startedAuthor: frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io': Data: Command: "cmd" /c ipconfig /all, CommandLine: "cmd" /c ipconfig /all, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Bootstrapper.exe", ParentImage: C:\Users\user\Desktop\Bootstrapper.exe, ParentProcessId: 6920, ParentProcessName: Bootstrapper.exe, ProcessCommandLine: "cmd" /c ipconfig /all, ProcessId: 7040, ProcessName: cmd.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Bootstrapper.exeReversingLabs: Detection: 63%
    Source: Bootstrapper.exeVirustotal: Detection: 80%Perma Link
    Source: unknownHTTPS traffic detected: 104.21.93.27:443 -> 192.168.2.16:49692 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.93.27:443 -> 192.168.2.16:49698 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 128.116.119.3:443 -> 192.168.2.16:49701 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.20.22.46:443 -> 192.168.2.16:49703 version: TLS 1.2
    Source: Bootstrapper.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: getsolara.dev
    Source: global trafficDNS traffic detected: DNS query: clientsettings.roblox.com
    Source: global trafficDNS traffic detected: DNS query: www.nodejs.org
    Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
    Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
    Source: unknownHTTPS traffic detected: 104.21.93.27:443 -> 192.168.2.16:49692 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.93.27:443 -> 192.168.2.16:49698 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 128.116.119.3:443 -> 192.168.2.16:49701 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.20.22.46:443 -> 192.168.2.16:49703 version: TLS 1.2
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6920 -s 2128
    Source: classification engineClassification label: mal60.evad.winEXE@8/7@3/53
    Source: C:\Users\user\Desktop\Bootstrapper.exeFile created: C:\Users\user\Desktop\DISCORD
    Source: C:\Users\user\Desktop\Bootstrapper.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6928:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7052:120:WilError_03
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6920
    Source: C:\Users\user\Desktop\Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\node-v18.16.0-x64.msi
    Source: Bootstrapper.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Bootstrapper.exeStatic file information: TRID: Win64 Executable Console Net Framework (206006/5) 46.24%
    Source: C:\Users\user\Desktop\Bootstrapper.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: Bootstrapper.exeReversingLabs: Detection: 63%
    Source: Bootstrapper.exeVirustotal: Detection: 80%
    Source: C:\Users\user\Desktop\Bootstrapper.exeFile read: C:\Users\user\Desktop\Bootstrapper.exe
    Source: unknownProcess created: C:\Users\user\Desktop\Bootstrapper.exe "C:\Users\user\Desktop\Bootstrapper.exe"
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c ipconfig /all
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6920 -s 2128
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c ipconfig /all
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: mscoree.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: apphelp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: version.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: iphlpapi.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: dnsapi.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: dhcpcsvc.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: winnsi.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: wldp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: profapi.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: cryptsp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rsaenh.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rasapi32.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rasman.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rtutils.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: mswsock.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: winhttp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rasadhlp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: fwpuclnt.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: secur32.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: sspicli.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: schannel.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: mskeyprotect.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ntasn1.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ncrypt.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ncryptsslp.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: msasn1.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dll
    Source: C:\Windows\System32\ipconfig.exeSection loaded: winnsi.dll
    Source: C:\Users\user\Desktop\Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
    Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
    Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: Bootstrapper.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
    Source: C:\Users\user\Desktop\Bootstrapper.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
    Source: C:\Users\user\Desktop\Bootstrapper.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Bootstrapper.exeMemory allocated: 26B6D3F0000 memory reserve | memory write watch
    Source: C:\Users\user\Desktop\Bootstrapper.exeMemory allocated: 26B6ED10000 memory reserve | memory write watch
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 600000
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599872
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599760
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599648
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599536
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599424
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599296
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599184
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599073
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598963
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598851
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598740
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598612
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598500
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598388
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598276
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598165
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598056
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597944
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597833
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597721
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597593
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597481
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597369
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597258
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597148
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597036
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596924
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596796
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596684
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596573
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596462
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596350
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596239
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596112
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595984
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595872
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595760
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595649
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595537
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595415
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595313
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595185
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595074
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594962
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594850
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594738
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594626
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594499
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594387
    Source: C:\Users\user\Desktop\Bootstrapper.exeWindow / User API: threadDelayed 9791
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -7378697629483816s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -600000s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599872s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599760s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599648s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599536s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599424s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599296s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599184s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -599073s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598963s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598851s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598740s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598612s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598500s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598388s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598276s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598165s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -598056s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597944s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597833s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597721s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597593s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597481s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597369s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597258s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597148s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -597036s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596924s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596796s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596684s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596573s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596462s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596350s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596239s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -596112s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595984s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595872s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595760s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595649s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595537s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595415s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595313s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595185s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -595074s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594962s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594850s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594738s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594626s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594499s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 6256Thread sleep time: -594387s >= -30000s
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 600000
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599872
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599760
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599648
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599536
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599424
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599296
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599184
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 599073
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598963
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598851
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598740
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598612
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598500
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598388
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598276
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598165
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 598056
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597944
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597833
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597721
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597593
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597481
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597369
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597258
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597148
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 597036
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596924
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596796
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596684
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596573
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596462
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596350
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596239
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 596112
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595984
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595872
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595760
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595649
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595537
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595415
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595313
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595185
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 595074
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594962
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594850
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594738
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594626
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594499
    Source: C:\Users\user\Desktop\Bootstrapper.exeThread delayed: delay time: 594387
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\Bootstrapper.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Yara matchFile source: \Device\ConDrv, type: DROPPED
    Source: C:\Users\user\Desktop\Bootstrapper.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c ipconfig /all
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig /all
    Source: C:\Users\user\Desktop\Bootstrapper.exeQueries volume information: C:\Users\user\Desktop\Bootstrapper.exe VolumeInformation
    Source: C:\Users\user\Desktop\Bootstrapper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Users\user\Desktop\Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Query Registry
    Remote ServicesData from Local System2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory1
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Process Injection
    NTDS41
    Virtualization/Sandbox Evasion
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
    System Network Configuration Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Bootstrapper.exe63%ReversingLabsWin64.Trojan.Heracles
    Bootstrapper.exe81%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    edge-term4-lhr2.roblox.com0%VirustotalBrowse
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    getsolara.dev
    104.21.93.27
    truefalse
      high
      www.nodejs.org
      104.20.22.46
      truefalse
        high
        edge-term4-lhr2.roblox.com
        128.116.119.3
        truefalseunknown
        clientsettings.roblox.com
        unknown
        unknownfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          128.116.119.3
          edge-term4-lhr2.roblox.comUnited States
          22697ROBLOX-PRODUCTIONUSfalse
          52.182.143.212
          unknownUnited States
          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
          104.21.93.27
          getsolara.devUnited States
          13335CLOUDFLARENETUSfalse
          104.20.22.46
          www.nodejs.orgUnited States
          13335CLOUDFLARENETUSfalse
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1575267
          Start date and time:2024-12-15 01:46:37 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Sample name:Bootstrapper.exe
          Detection:MAL
          Classification:mal60.evad.winEXE@8/7@3/53
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 52.182.143.212
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):1.2582004309502097
          Encrypted:false
          SSDEEP:
          MD5:84EA02A6EAE90A1D76DBAAD95E34F7A4
          SHA1:1FECCABEB54F7B54718BCEF97F87E0F12BCC9BF8
          SHA-256:44B724237F4D2AA1CC668CAC737CEA1B1260D3CD5659C51AE0B1EF030A21A149
          SHA-512:657F3F8F6A35C68C5720871DC521B4F25E924FCD81F87111075E2EA24A57312985EC9344D7B7FD2FE72693C89B264DAC5C44D371ED29562718B9EF7C12F0F1E5
          Malicious:true
          Reputation:unknown
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.6.9.7.2.4.0.6.9.7.3.7.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.6.9.7.2.4.1.3.4.6.3.7.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.9.b.7.0.a.9.e.-.2.4.a.1.-.4.6.8.f.-.8.6.1.1.-.3.6.2.3.6.a.a.e.3.9.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.1.b.c.7.e.c.-.f.7.3.b.-.4.7.3.6.-.9.9.7.2.-.e.d.0.7.d.e.d.e.a.2.a.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.B.o.o.t.s.t.r.a.p.p.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.o.l.a.r.a.B.o.o.t.s.t.r.a.p.p.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.0.8.-.0.0.0.1.-.0.0.1.6.-.1.7.3.b.-.f.d.d.d.8.a.4.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.f.e.1.7.3.6.3.1.c.a.d.c.4.a.7.6.9.5.d.3.9.9.5.7.a.1.2.d.e.9.c.0.0.0.0.0.0.0.0.!.0.0.0.0.3.0.2.3.1.a.4.6.7.a.4.9.c.c.3.7.7.6.8.e.e.a.0.f.5.5.f.4.b.e.a.1.c.b.f.b.4.8.e.2.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Mini DuMP crash report, 16 streams, Sun Dec 15 00:47:21 2024, 0x1205a4 type
          Category:dropped
          Size (bytes):615734
          Entropy (8bit):3.246031750677983
          Encrypted:false
          SSDEEP:
          MD5:06BC7ED306A8686F905749E411A5DD93
          SHA1:6053E27A172DB51E37FFFCEFEC90CE5A8B81F388
          SHA-256:CF806645F9BE5D524EB468B6FEB0A85FE84CC914EFF629421234648769AB26E7
          SHA-512:4F0817504BFEA99748FF585C8E526452C39BDFCF81C92283896A4A4F9E1D132FFEE383CF3CBD7DDF22E3D5B8771771AB8DCC8CAED5DC18921354476768AFC570
          Malicious:false
          Reputation:unknown
          Preview:MDMP..a..... ........'^g............d...........<...........<....)...........)......$U..............l.......8...........T............U...............E...........G..............................................................................eJ......pH......Lw......................T............'^g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8830
          Entropy (8bit):3.696819225523001
          Encrypted:false
          SSDEEP:
          MD5:DED350DD4FEDDA658EECE414E3C75E6D
          SHA1:E5ADD92818BA900D8901418A99FA33BB3995DFA1
          SHA-256:8C4641E907BAF258CB0DB695DBAB4498723C4522AF80001DFA0DC7DDB92BC066
          SHA-512:CBC9256A79AE0C53A062F59FE8330C8DED8C0B41C25B9343557EF8D536289C2C9B050A5FAF430BBDDDB7A6C685103AC85FE27912EB1D695CD82991127D288C15
          Malicious:false
          Reputation:unknown
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.2.0.<./.P.i.
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4809
          Entropy (8bit):4.448608439597044
          Encrypted:false
          SSDEEP:
          MD5:7CD5BA05BBB916989FCF2F17F338A785
          SHA1:5C48BCB404AC422007AF6D095A596E9732F42E73
          SHA-256:29BE1A6717E2F2D0213B0C8342EC18C5EACAAD38C7D94BE1D0FA2350001A71E3
          SHA-512:72ADEE6DB9151937B709A9D4533E00B16EA94CF8F97B0A009E3173B6F8DE2B6C5DC9DCB59AEB366E59D1D83C538D7D0027E2BFA54768F0952228B5F2165BF033
          Malicious:false
          Reputation:unknown
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="631670" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Users\user\Desktop\Bootstrapper.exe
          File Type:JSON data
          Category:dropped
          Size (bytes):103
          Entropy (8bit):4.081427527984575
          Encrypted:false
          SSDEEP:
          MD5:B016DAFCA051F817C6BA098C096CB450
          SHA1:4CC74827C4B2ED534613C7764E6121CEB041B459
          SHA-256:B03C8C2D2429E9DBC7920113DEDF6FC09095AB39421EE0CC8819AD412E5D67B9
          SHA-512:D69663E1E81EC33654B87F2DFADDD5383681C8EBF029A559B201D65EB12FA2989FA66C25FA98D58066EAB7B897F0EEF6B7A68FA1A9558482A17DFED7B6076ACA
          Malicious:false
          Reputation:unknown
          Preview:{. "args" : {. "code" : "8PgspRYAQu". },. "cmd" : "INVITE_BROWSER",. "nonce" : ".". }
          Process:C:\Windows\System32\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.310205743368484
          Encrypted:false
          SSDEEP:
          MD5:FCECFFE6709FE4AB00B241B0EF705A41
          SHA1:961DC262FC0665A234587B91B5192A649215F373
          SHA-256:4CA504D3383D968F4C7842D11FF9A43BA364D197CE9BC6FE582AA93A6A03D8ED
          SHA-512:120F5A7541600050D3D2EEB78144BEAC52D760266121CA24F015FBA9501C568D2CA8C8A96F6F4F7CEEBCFA53C6F954E1E640C0EB71665D472E0D4D7C415E472C
          Malicious:false
          Reputation:unknown
          Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm^%..N..............................................................................................................................................................................................................................................................................................................................................r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\Bootstrapper.exe
          File Type:ISO-8859 text, with CRLF, LF line terminators
          Category:dropped
          Size (bytes):571
          Entropy (8bit):4.9398118662542965
          Encrypted:false
          SSDEEP:
          MD5:5294778E41EE83E1F1E78B56466AD690
          SHA1:348B8B4687216D57B8DF59BBCEC481DC9D1E61A6
          SHA-256:3AC122288181813B83236E1A2BCB449C51B50A3CA4925677A38C08B2FC6DF69C
          SHA-512:381FB6F3AA34E41C17DB3DD8E68B85508F51A94B3E77C479E40AD074767D1CEAE89B6E04FB7DD3D02A74D1AC3431B30920860A198C73387A865051538AE140F1
          Malicious:true
          Yara Hits:
          • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: \Device\ConDrv, Author: Joe Security
          Reputation:unknown
          Preview:.............................................................------------------------.. ..[-] Fetching endpoint.....[-] Bootstrapper up to date...[-] Killing conflicting processes.....[-] Ensuring essential directories.....[-] Ensuring essential dependencies.....[-] Downloading node......Unhandled Exception: System.Net.WebException: The operation has timed out.. at System.Net.WebClient.DownloadFile(Uri address, String fileName).. at Program.DownloadAndInstallNode().. at Program.EnsureDependencies().. at Program.Main(String[] args).
          File type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.598261375667174
          TrID:
          • Win64 Executable Console Net Framework (206006/5) 46.24%
          • Win64 Executable Console (202006/5) 45.34%
          • Win64 Executable (generic) Net Framework (21505/4) 4.83%
          • Win64 Executable (generic) (12005/4) 2.69%
          • Generic Win/DOS Executable (2004/3) 0.45%
          File name:Bootstrapper.exe
          File size:819'200 bytes
          MD5:02c70d9d6696950c198db93b7f6a835e
          SHA1:30231a467a49cc37768eea0f55f4bea1cbfb48e2
          SHA256:8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
          SHA512:431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
          SSDEEP:12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz
          TLSH:D60539107BE8DA13E1EF6736A8B54B181BF5F1C1B262EB8F658856E82C037046D5036F
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....5g.........."......v............... ....@...... ....................................`................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x4c948a
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x6735151B [Wed Nov 13 21:07:39 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [004C9498h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          insb
          xchg eax, esp
          or al, 00h
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xc94340x54.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xca0000x575.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0xcc0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xc94980x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000xc74a80xc7600d9a73aea6be4adcc91ca5e381f1c1436False0.34694234913793104data5.603888358836962IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0xca0000x5750x600706ed0398f1aa324656eb5102ff400cfFalse0.39453125data3.770686100904012IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0xcc0000xc0x20037d9bb2189ab2cf85e4fa7627eed6d58False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0xca0900x36cdata0.3995433789954338
          RT_MANIFEST0xca40c0x169XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.6204986149584487
          DLLImport
          mscoree.dll_CorExeMain