Analysis
-
max time kernel
600s -
max time network
574s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 15:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dosya.co/rtuqn1il6ldi/abotz.exe.html
Resource
win10v2004-20240802-en
General
-
Target
https://dosya.co/rtuqn1il6ldi/abotz.exe.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 3172 msedge.exe 3172 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4952 3172 msedge.exe 86 PID 3172 wrote to memory of 4952 3172 msedge.exe 86 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2888 3172 msedge.exe 87 PID 3172 wrote to memory of 2088 3172 msedge.exe 88 PID 3172 wrote to memory of 2088 3172 msedge.exe 88 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89 PID 3172 wrote to memory of 4404 3172 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dosya.co/rtuqn1il6ldi/abotz.exe.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9931e46f8,0x7ff9931e4708,0x7ff9931e47182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14201774057538133985,5469757743219220061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5beaf94c3187fabba27f16cce32745758
SHA1e46b62e982ae0687eedb53b081060b70efb880d6
SHA2566332a32a69e26c7eb7a4991fa32f92b80d17eb3b126e89f99f75c133473f9676
SHA5121bb1fbd1447e1875cf421d1f779b47a9c3da7c5d5e897e1854a2d4f481468fd45e1415bd27a2dd35d55934940e851c0e2d11b739c1e779450008bcf18cf7d5f3
-
Filesize
2KB
MD57d28bdaef8b64d7a632a69a4cdc13519
SHA193e4b583527c5890b55ad27811bef506ed190958
SHA25687dc60c3a9da0ed31e82d5b70fff50ff8914a197eca907d2862169a5f5425dcb
SHA512196092873fb8d0cfc66c794b54c5514cfc75c0dd069107d3da056f13031fa778f88f819ea15fc1e3306ee26dbc154586ef2ba3fce121bc45712a9af8ed76a5b3
-
Filesize
5KB
MD5e98717b2f32fb539fdad2f57bb074611
SHA19e2e86b3d30a47df96c594d3695b16ae3fb51e0e
SHA256881a727113db21472d0c5dc2172dc1451572cf89fccd2244c81122ab021afd6b
SHA512d3514a0c22fca9b35f91f312b2ce584cbc8536ac2db14267baff01c73f1aa427455b47708b5c3e741b21ffa418487448368436c1445676cf5932494d076cc0dd
-
Filesize
7KB
MD5ff5b3a9e6fb40413e97adabb6b376d08
SHA1d562975c2f91ae0eaadeb43e4c2b08a380dc2907
SHA2562e1010785fd0dd48f02a35a3a7f10d0cbf312c709bb3a2a94def60d8419e3030
SHA5127194d4749482dbbefcc5c7d56704353e082ff5ad27ca9c7639efa84b470ad1b1ba573c9c8dd5db29e1e81febcf92ac2617dd1d052a2d894e0c2260d56b10ba1d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD535f9a34a7d38241f0b739cc852fd74a1
SHA1b7d7b2b552573306beb3852b2976da8cec7a7e7a
SHA2560608e4cb1617e2ca4f2969b3bf2fdcdc95534f9a676582c73801503024788783
SHA512a4519b570141ec4239d57e91adab040478dcbb1578c64a562b63e63842a8399c9723214f7dc35109ea16c05056b559803c9fd545e811f560462510d31e8c7b0c