Analysis
-
max time kernel
1688s -
max time network
1694s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/07/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
Bozar-1.7.0.exe
Resource
win11-20240704-en
General
-
Target
Bozar-1.7.0.exe
-
Size
190KB
-
MD5
662074dd16045a331c7b9374d00b8130
-
SHA1
53096bedd1be55ff2ee591c25776a663d2b4324e
-
SHA256
d8385c91090ef9b4085e156e12008f9d140543ce4e4c65d6ddaffe9a5475034e
-
SHA512
05362ab716b5607d7aacc91e02cbca15a93b433c1e893273d3d7aa0918429ca45cd2263e511fb3fb2b1fc28e35ee229a9a0c088ad692a70be55dd3961ffe213a
-
SSDEEP
3072:nAnV0CAXLWiQDK2ZhH+fvgssmRvgj0pa6D8jKJVOh2HxLO3AJkvGTQDMBO1zbCqX:M0CASN7+c6YIA6D8jKJV1O3SQJpCl3oZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 232 msedge.exe 232 msedge.exe 4792 msedge.exe 4792 msedge.exe 4548 identity_helper.exe 4548 identity_helper.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 420 wrote to memory of 232 420 Bozar-1.7.0.exe 81 PID 420 wrote to memory of 232 420 Bozar-1.7.0.exe 81 PID 232 wrote to memory of 4284 232 msedge.exe 82 PID 232 wrote to memory of 4284 232 msedge.exe 82 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 2480 232 msedge.exe 83 PID 232 wrote to memory of 4576 232 msedge.exe 84 PID 232 wrote to memory of 4576 232 msedge.exe 84 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85 PID 232 wrote to memory of 4812 232 msedge.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bozar-1.7.0.exe"C:\Users\Admin\AppData\Local\Temp\Bozar-1.7.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://java.com/download2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffce2703cb8,0x7ffce2703cc8,0x7ffce2703cd83⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1872 /prefetch:23⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:83⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:13⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:13⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:13⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:13⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:13⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:13⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:13⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:13⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1840,4287374686050335022,6891429552356270989,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4864 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50176e968a02096540e4a096219a8fe34
SHA1cd301ea619d7c92daf64446caea1f1293da48373
SHA256f9319c68cc75bc8e334037d946cc89ad65605606c1bfd12a2fe2ebd711b14067
SHA512b6aba8640823d43f8968ff31a2e5a48b6f6def43ea6f83cef801294ea1ca9eb1fa16cec516893485b650d7b4407e34536b380712fb72bc9da581cc2e1e0ae2d8
-
Filesize
152B
MD56c1de55e8af0859bea07b6af77782896
SHA1d5efde7bcf31d692d697ebbc54ccd13fb3624856
SHA256130afd8eb97d11640a28231e9314983eee9eff75964c93abd71e84e6412f710f
SHA5129664d41b0b1767ddc4012318fca427edf9606c525f868a5ba98e5987bf5e71e4710dd19a0ed7223c706588b5803f3b118ee949c51d6fd99696049befff5fd510
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD59bfe83caed860969c661e3d0bf9f4e49
SHA14c8401229da2c2ccd4a11c1352d2189a5b2d8eed
SHA256476ad1e17c6f63f4f161c14470af9c1726d7c2b9dd96223c2859035db7012833
SHA5126b13281b70fd194d5ecc05e101562083ec489f8445ff21f96df670559df667c8e75c23e0fd7912325eabae1d53bb2814a0fc2fff4f886b6f391db223339f29fa
-
Filesize
654B
MD5493834056b98f31683fbcd70d0043783
SHA1802238037d15689a5c8116126e08b845678dfaf1
SHA25665fa6d0314b66cba740728ea165d1c654f0e10b7472b7bcd37364bf0ccc4cd43
SHA5122438a30abb354be07df15b7335fde512b2322baf13c72f00844ed38c4f1caffa3e86d3fc86c49a18f0eebf01b61d1f9b8fad09b8851b65b212d1f5179731eddf
-
Filesize
5KB
MD5593f04e90433e3a2b09ae9424ceffc32
SHA11ad3c03ff342926ff71d9024e5ca9432922fdf68
SHA25696d55996c77379fd2db91b1d179f396e4e2564a958b0964dc928223918fe5585
SHA5121bdbb077fdd24be8a8a7b8078be0a4e5fd42261a9ea4c4b93b8598a9df4e2fc28eb84d1f5a4002cc173b1e74e78d1ed35b46a0855a441b15e4a3866164f9e9dd
-
Filesize
6KB
MD5d56aa12c9ad318c7ce5d88c3536e6bc3
SHA1cbb86fee2bad920b5b0bf9a380de58a88ba3d9ca
SHA2560c817ad4388f90feea8b64773e289cc81f7234f0f8577943ec5868507d48e36b
SHA51297e303abad0e0c9f2285cabf860e60156e9574723338dc1ae54da14f4ecca815954b3a9c969e9bd4c4567fc385ab2c1739b7b8ab92937dec3fd5f3ff2c85f8fb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5abd0012f6f2b945d2e3b865afdb67e4f
SHA1f4363d27aca0f171941d9cb93e5068221e412001
SHA2560150419e90df751918217334d61be73398a5bcf3654157f039f994b1cc35966b
SHA512b2fc2b51fda9b828dae38acd51bbd0974492809de88f334e6b7f217a8a8311b6929247233f7807bd4f94f282ec7b539ebd22e19569e7ed739bb12758ebd8c367