File name:

Bootstrapper.23.exe

Full analysis: https://app.any.run/tasks/b07789f9-e39e-40ff-98dc-99fd5ddf3c9f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 13, 2024, 12:23:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
exfiltration
stealer
evasion
discordrat
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 8 sections
MD5:

4FB8FE2BBBFA6FE0A143E1324DC4A5E8

SHA1:

C70606A2AB08E430423314E6B3E8700E61C2CC27

SHA256:

6E26CD89DB50B9EDAA16D472DD81B869A014EF5B48F9BEDDF2B7CD682649F402

SSDEEP:

24576:IuhM0wq9ZKk6k/p1MlvPegvuyhDKXptz3fuVFIy:7M0wq9ZV6kUlvPvuyhDKXpd3fuVFIy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DISCORDRAT has been detected (YARA)

      • bootstrapper.exe (PID: 624)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Bootstrapper.23.exe (PID: 1868)
    • Reads the date of Windows installation

      • Bootstrapper.23.exe (PID: 1868)
    • Executable content was dropped or overwritten

      • Bootstrapper.23.exe (PID: 1868)
    • Starts CMD.EXE for commands execution

      • BootstrapperV1.23.exe (PID: 5640)
    • Process uses IPCONFIG to discover network configuration

      • cmd.exe (PID: 5460)
    • The process connected to a server suspected of theft

      • bootstrapper.exe (PID: 624)
    • Checks for external IP

      • bootstrapper.exe (PID: 624)
      • svchost.exe (PID: 2192)
    • Uses WMIC.EXE to obtain information about the network interface controller

      • cmd.exe (PID: 836)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • bootstrapper.exe (PID: 624)
  • INFO

    • Checks supported languages

      • Bootstrapper.23.exe (PID: 1868)
      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • Reads the computer name

      • Bootstrapper.23.exe (PID: 1868)
      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • The process uses the downloaded file

      • Bootstrapper.23.exe (PID: 1868)
    • Process checks computer location settings

      • Bootstrapper.23.exe (PID: 1868)
    • Disables trace logs

      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • Checks proxy server information

      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • Reads Environment values

      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • Reads the software policy settings

      • bootstrapper.exe (PID: 624)
    • Reads the machine GUID from the registry

      • bootstrapper.exe (PID: 624)
      • BootstrapperV1.23.exe (PID: 5640)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 2216)
    • Attempting to use instant messaging service

      • bootstrapper.exe (PID: 624)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:05:12 10:17:07+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.33
CodeSize: 288768
InitializedDataSize: 210944
UninitializedDataSize: -
EntryPoint: 0x32ee0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
12
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start bootstrapper.23.exe bootstrapperv1.23.exe no specs bootstrapperv1.23.exe #DISCORDRAT bootstrapper.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBootstrapperV1.23.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
624"C:\Users\admin\Desktop\bootstrapper.exe" C:\Users\admin\Desktop\bootstrapper.exe
Bootstrapper.23.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Discord rat
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\bootstrapper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
836"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")C:\Windows\System32\cmd.exeBootstrapperV1.23.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1224ipconfig /allC:\Windows\System32\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
1868"C:\Users\admin\Desktop\Bootstrapper.23.exe" C:\Users\admin\Desktop\Bootstrapper.23.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\bootstrapper.23.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2216wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
4132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4516"C:\Users\admin\Desktop\BootstrapperV1.23.exe" C:\Users\admin\Desktop\BootstrapperV1.23.exeBootstrapper.23.exe
User:
admin
Integrity Level:
MEDIUM
Description:
SolaraBootstrapper
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\bootstrapperv1.23.exe
c:\windows\system32\ntdll.dll
4540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
7 438
Read events
7 410
Write events
28
Delete events
0

Modification events

(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(624) bootstrapper.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bootstrapper_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1868Bootstrapper.23.exeC:\Users\admin\Desktop\BootstrapperV1.23.exeexecutable
MD5:02C70D9D6696950C198DB93B7F6A835E
SHA256:8F2E28588F2303BD8D7A9B0C3FF6A9CB16FA93F8DDC9C5E0666A8C12D6880EE3
1868Bootstrapper.23.exeC:\Users\admin\Desktop\bootstrapper.exeexecutable
MD5:DF7D3CDAEC61A64A6ED21D2589AFFBD5
SHA256:E4F24A73140E7C65201F58A76BAE9E4BF05D064CFD726D1A559CD509C79DEC57
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
25
DNS requests
51
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
101
162.159.133.234:443
https://gateway.discord.gg/?v=9&encording=json
unknown
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2324
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2324
svchost.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
159.89.102.253:443
https://geolocation-db.com/json/
unknown
binary
153 b
whitelisted
POST
201
162.159.135.232:443
https://discord.com/api/v9/guilds/1287346091842342942/channels
unknown
binary
232 b
whitelisted
POST
200
162.159.138.232:443
https://discord.com/api/v9/channels/1317104551375147060/messages
unknown
binary
670 b
whitelisted
GET
301
159.89.102.253:443
https://geolocation-db.com/json
unknown
html
194 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
2324
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
624
bootstrapper.exe
162.159.135.234:443
gateway.discord.gg
CLOUDFLARENET
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2324
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
624
bootstrapper.exe
162.159.138.232:443
discord.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.78
whitelisted
gateway.discord.gg
  • 162.159.135.234
  • 162.159.130.234
  • 162.159.136.234
  • 162.159.134.234
  • 162.159.133.234
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 23.48.23.162
  • 23.48.23.147
  • 23.48.23.159
  • 23.48.23.141
  • 23.48.23.194
  • 23.48.23.193
  • 23.48.23.158
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
discord.com
  • 162.159.138.232
  • 162.159.128.233
  • 162.159.136.232
  • 162.159.137.232
  • 162.159.135.232
whitelisted
geolocation-db.com
  • 159.89.102.253
whitelisted
getsolara.dev
malicious
dns.msftncsi.com
whitelisted
gitlab.com
whitelisted

Threats

PID
Process
Class
Message
624
bootstrapper.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
624
bootstrapper.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Attempt to exfiltrate via Discord
624
bootstrapper.exe
Misc activity
ET INFO External IP Lookup Domain (geolocation-db .com) in TLS SNI
2192
svchost.exe
Misc activity
ET INFO External IP Lookup Domain in DNS Lookup (geolocation-db .com)
624
bootstrapper.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2 ETPRO signatures available at the full report
No debug info