Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 08:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe
Resource
win10v2004-20220812-en
General
-
Target
d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe
-
Size
1016KB
-
MD5
70a155e2e1122d8e447f1e35da521820
-
SHA1
35023c7ed32bd11d30fccd0dedaf0c19a24bebb9
-
SHA256
d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
-
SHA512
a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
SSDEEP
12288:vIXsgtvm1De5YlOx6lzBH46UQlgMI1MM:vU81yMBbVlgMI1MM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" iffdguquspp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hnzglp.exe -
Adds policy Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\unmgypeepkwbjpawamy.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "wrsoibsuheszjreciwkfg.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hbbwphxykgtzipbydqdx.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "hbbwphxykgtzipbydqdx.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "unmgypeepkwbjpawamy.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "jbzsjznmwqbfmrbwzk.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "hbbwphxykgtzipbydqdx.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "tjfwlzliqirtybjc.exe" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "unmgypeepkwbjpawamy.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ozqcmvcuxko = "hbbwphxykgtzipbydqdx.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jrfovbfu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hnzglp.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe -
Executes dropped EXE 3 IoCs
pid Process 1716 iffdguquspp.exe 524 hnzglp.exe 692 hnzglp.exe -
Loads dropped DLL 6 IoCs
pid Process 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1716 iffdguquspp.exe 1716 iffdguquspp.exe 1716 iffdguquspp.exe 1716 iffdguquspp.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "arogwlywfyilrveya.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "unmgypeepkwbjpawamy.exe" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "unmgypeepkwbjpawamy.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "wrsoibsuheszjreciwkfg.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "jbzsjznmwqbfmrbwzk.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odyocpawducdhjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "hbbwphxykgtzipbydqdx.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "unmgypeepkwbjpawamy.exe ." iffdguquspp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hnzglp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "tjfwlzliqirtybjc.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "jbzsjznmwqbfmrbwzk.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "tjfwlzliqirtybjc.exe ." hnzglp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "wrsoibsuheszjreciwkfg.exe ." iffdguquspp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "tjfwlzliqirtybjc.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "arogwlywfyilrveya.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "unmgypeepkwbjpawamy.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "tjfwlzliqirtybjc.exe" hnzglp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iffdguquspp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "hbbwphxykgtzipbydqdx.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odyocpawducdhjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "unmgypeepkwbjpawamy.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hbbwphxykgtzipbydqdx.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe ." hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odyocpawducdhjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\unmgypeepkwbjpawamy.exe" iffdguquspp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe ." iffdguquspp.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "hbbwphxykgtzipbydqdx.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odyocpawducdhjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "wrsoibsuheszjreciwkfg.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hbbwphxykgtzipbydqdx.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "jbzsjznmwqbfmrbwzk.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kxqeqbkejyedf = "wrsoibsuheszjreciwkfg.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "unmgypeepkwbjpawamy.exe" iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "arogwlywfyilrveya.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lztivhrmsippst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\arogwlywfyilrveya.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "tjfwlzliqirtybjc.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "C:\\Users\\Admin\\AppData\\Local\\Temp\\unmgypeepkwbjpawamy.exe" hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajyiqxcst = "jbzsjznmwqbfmrbwzk.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jbzsjznmwqbfmrbwzk.exe ." iffdguquspp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\odyocpawducdhjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe" hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tjfwlzliqirtybjc.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wrsoibsuheszjreciwkfg.exe ." hnzglp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdtenvbsug = "wrsoibsuheszjreciwkfg.exe ." hnzglp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\lxpcnxfycqvt = "wrsoibsuheszjreciwkfg.exe" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce hnzglp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hnzglp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 whatismyipaddress.com 5 www.showmyipaddress.com 8 whatismyip.everdot.org -
Drops file in System32 directory 25 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\njlidxpsgetbmvjipetpro.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\arogwlywfyilrveya.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\tjfwlzliqirtybjc.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\jbzsjznmwqbfmrbwzk.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\arogwlywfyilrveya.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\unmgypeepkwbjpawamy.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\hbbwphxykgtzipbydqdx.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\wrsoibsuheszjreciwkfg.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\tjfwlzliqirtybjc.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\tjfwlzliqirtybjc.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\jbzsjznmwqbfmrbwzk.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\njlidxpsgetbmvjipetpro.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File created C:\Windows\SysWOW64\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe File opened for modification C:\Windows\SysWOW64\jbzsjznmwqbfmrbwzk.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\njlidxpsgetbmvjipetpro.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\arogwlywfyilrveya.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\hbbwphxykgtzipbydqdx.exe hnzglp.exe File created C:\Windows\SysWOW64\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File opened for modification C:\Windows\SysWOW64\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe File opened for modification C:\Windows\SysWOW64\unmgypeepkwbjpawamy.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\hbbwphxykgtzipbydqdx.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\wrsoibsuheszjreciwkfg.exe iffdguquspp.exe File opened for modification C:\Windows\SysWOW64\unmgypeepkwbjpawamy.exe hnzglp.exe File opened for modification C:\Windows\SysWOW64\wrsoibsuheszjreciwkfg.exe hnzglp.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File created C:\Program Files (x86)\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File opened for modification C:\Program Files (x86)\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe File created C:\Program Files (x86)\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\njlidxpsgetbmvjipetpro.exe iffdguquspp.exe File opened for modification C:\Windows\unmgypeepkwbjpawamy.exe hnzglp.exe File created C:\Windows\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File created C:\Windows\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe File opened for modification C:\Windows\tjfwlzliqirtybjc.exe iffdguquspp.exe File opened for modification C:\Windows\hbbwphxykgtzipbydqdx.exe iffdguquspp.exe File opened for modification C:\Windows\arogwlywfyilrveya.exe hnzglp.exe File opened for modification C:\Windows\tjfwlzliqirtybjc.exe hnzglp.exe File opened for modification C:\Windows\wrsoibsuheszjreciwkfg.exe hnzglp.exe File opened for modification C:\Windows\njlidxpsgetbmvjipetpro.exe hnzglp.exe File opened for modification C:\Windows\njlidxpsgetbmvjipetpro.exe hnzglp.exe File opened for modification C:\Windows\yzgiihemficpftmqcwqryaa.wex hnzglp.exe File opened for modification C:\Windows\jbzsjznmwqbfmrbwzk.exe iffdguquspp.exe File opened for modification C:\Windows\tjfwlzliqirtybjc.exe hnzglp.exe File opened for modification C:\Windows\lxpcnxfycqvtutxmjotfxkvfngkydbcbfu.wbn hnzglp.exe File opened for modification C:\Windows\wrsoibsuheszjreciwkfg.exe iffdguquspp.exe File opened for modification C:\Windows\wrsoibsuheszjreciwkfg.exe hnzglp.exe File opened for modification C:\Windows\arogwlywfyilrveya.exe iffdguquspp.exe File opened for modification C:\Windows\unmgypeepkwbjpawamy.exe iffdguquspp.exe File opened for modification C:\Windows\hbbwphxykgtzipbydqdx.exe hnzglp.exe File opened for modification C:\Windows\jbzsjznmwqbfmrbwzk.exe hnzglp.exe File opened for modification C:\Windows\unmgypeepkwbjpawamy.exe hnzglp.exe File opened for modification C:\Windows\hbbwphxykgtzipbydqdx.exe hnzglp.exe File opened for modification C:\Windows\jbzsjznmwqbfmrbwzk.exe hnzglp.exe File opened for modification C:\Windows\arogwlywfyilrveya.exe hnzglp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 524 hnzglp.exe 524 hnzglp.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 524 hnzglp.exe 524 hnzglp.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 524 hnzglp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1716 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 27 PID 1768 wrote to memory of 1716 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 27 PID 1768 wrote to memory of 1716 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 27 PID 1768 wrote to memory of 1716 1768 d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe 27 PID 1716 wrote to memory of 524 1716 iffdguquspp.exe 28 PID 1716 wrote to memory of 524 1716 iffdguquspp.exe 28 PID 1716 wrote to memory of 524 1716 iffdguquspp.exe 28 PID 1716 wrote to memory of 524 1716 iffdguquspp.exe 28 PID 1716 wrote to memory of 692 1716 iffdguquspp.exe 29 PID 1716 wrote to memory of 692 1716 iffdguquspp.exe 29 PID 1716 wrote to memory of 692 1716 iffdguquspp.exe 29 PID 1716 wrote to memory of 692 1716 iffdguquspp.exe 29 -
System policy modification 1 TTPs 32 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" hnzglp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System iffdguquspp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" hnzglp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" hnzglp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe"C:\Users\Admin\AppData\Local\Temp\d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\iffdguquspp.exe"C:\Users\Admin\AppData\Local\Temp\iffdguquspp.exe" "c:\users\admin\appdata\local\temp\d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\hnzglp.exe"C:\Users\Admin\AppData\Local\Temp\hnzglp.exe" "-C:\Users\Admin\AppData\Local\Temp\tjfwlzliqirtybjc.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\hnzglp.exe"C:\Users\Admin\AppData\Local\Temp\hnzglp.exe" "-C:\Users\Admin\AppData\Local\Temp\tjfwlzliqirtybjc.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:692
-
-
Network
-
Remote address:8.8.8.8:53Requestwhatismyipaddress.comIN AResponsewhatismyipaddress.comIN A104.16.155.36whatismyipaddress.comIN A104.16.154.36
-
Remote address:104.16.155.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=ZUrMhlxovpksVWtM.NQvSPLqNK4J9_SOLYQApqdHlko-1664704690-0-AU4z2oRMAh8i9R2iPXsIitw3mHi6IwomDlV/UKkmYG7aUgeMN3uSYlZjfhZ2/qCh8t6NDCvRGsUS8VsTqP1K8To=; path=/; expires=Sun, 02-Oct-22 10:28:10 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 753c93fdde39b79c-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.155.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=jLbpMiVk0.EyxMrTVK1ShwpLJqMK7kAxFXYr4yILhzE-1664704692-0-AZT9/5c77f5Caml78CA3qWLFRnFjcBWuGEFn5DcZSYMox+nZiZxES3EijNcgCVj78QK0r2UXVDYkKRPfrEmGY6g=; path=/; expires=Sun, 02-Oct-22 10:28:12 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 753c94090d53b97e-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.whatismyip.caIN AResponse
-
Remote address:8.8.8.8:53Requestwww.showmyipaddress.comIN AResponsewww.showmyipaddress.comIN A188.114.96.3www.showmyipaddress.comIN A188.114.97.3
-
Remote address:188.114.96.3:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:16 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zDWrNlfCS%2BhNxXK%2BNOO0evYd%2FBJ%2BmJc%2BWl24o7tZTksjnoM2p1qO3%2FVYeaq4C4zWv%2BZ1yl8KvjcNU%2F%2BfStMaFBn0PxIRvbEO2jbdOU0ZfJtFwrmtDqaMcTaejNk1qn8UYBs3IlKFxHfUEw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 753c94201d45b93c-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwhatismyip.everdot.orgIN AResponse
-
Remote address:188.114.96.3:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:21 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kTKMqxC32es88ZXlwyeUejAenilMu9L1nMw2aOuA4A5A9H37so4f8mCCKTPyMHHulOe5DslUNxYVtGKM%2Bfbqdx8mKxLi0omzk9OHaCQtBLp6NPej2jCsTPN6iqkcfOu2HRk2sTwnfgB7Pw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 753c94417b32b7f1-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.whatismyip.comIN AResponsewww.whatismyip.comIN A104.21.89.158www.whatismyip.comIN A172.67.189.152
-
Remote address:104.21.89.158:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:25 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=bshqZSixQRCk%2BarUVML6YApjhBrz%2F3TryxXPZgoZsJ8Te6%2BTaRdcQTG5Yf8F6JtnQUdRg2qWUGZILAP%2FT3j%2F%2FaBgKGZM0wKyWRZJntQNYuf%2BdbwaQt9pRiWVPDcRr1tHrGVVIA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 753c9457d8b6b884-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.155.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=n1QIO10TKu5SwkCZFuNJe.jK920d1O86Y0aVRensjZg-1664704708-0-AS2TNSANI9cJpBkiAwLDJIYqet0CLr/yefGfZLIX7Jmb3hUKaF19EjLQMMo/noWXDHysEvUqQpwGKNc8GaF6QiA=; path=/; expires=Sun, 02-Oct-22 10:28:28 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 753c946e2a00b7c1-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:188.114.96.3:80RequestGET / HTTP/1.1
Host: www.showmyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:30 GMT
Location: https://www.showmyipaddress.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=XJDOmDxMNOv896URGp%2BoyBGSlzlx0u3nj3o0UoUf2oY2LNQRK%2Fi8laBq71o%2FYJX7%2FPA2gST27HCP9UbApC0HlwfzafMWc7tPxYjB2%2FY6mPh3rU0cJtigXWQvntksC2Edv8evdliA6AOuyg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 753c9479682eb8d0-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.155.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=3ZsUre7G2MYDDxCkG1q6RPSHl2fCqPl32Mkba_4J4Hg-1664704712-0-ASQ8zvyK0xJRSWqRBUkiL6t8mOBnDHg1Osn81yFE4qdNB7S48Zb8YpxjvdcvJBq3/P2aYzEIFHJmPNF5NwDxm2s=; path=/; expires=Sun, 02-Oct-22 10:28:32 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 753c9484ab60b951-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.21.89.158:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:43 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=gSSDbUil7AWUC2xrxSaOjS7UNW%2B3DscYb7NMQK4CH96PuGqvEArkNENcOs086zuYYfunG2Rj30KjEzFPOh0IuthSrwfu%2BbTNs5Xq%2FfdJ4XY42ifZOMDQGVge46fsAidP7Bq9sQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 753c94c6fccfb7e5-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.21.89.158:80RequestGET / HTTP/1.1
Host: www.whatismyip.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: close
Cache-Control: max-age=3600
Expires: Sun, 02 Oct 2022 10:58:44 GMT
Location: https://www.whatismyip.com/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7D7utEtl%2BvffppqpEDUDEEU2ogE1cffIHBEid35j1Sosd9nar6HWbah4phu%2FB368pwQaKy1E7GT5WBSVps4oEUos16zBkL1KwJit%2Ft4zp2cMUp5B%2FZnhpyhcoqRnGb3HHNmR6A%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 753c94d24c7cb713-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:104.16.155.36:80RequestGET / HTTP/1.1
Host: whatismyipaddress.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=UTF-8
Content-Length: 16
Connection: close
X-Frame-Options: SAMEORIGIN
Referrer-Policy: same-origin
Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Set-Cookie: __cf_bm=ofH6NuknP4NK70pret9Ad50PeVnSvXkOhE4W.pc5uSQ-1664704726-0-AfbU3yPmvzMESnxKEC/cKGNwonHUK9JXUmC/Un4khYFJdR0hPVG+xVCeVi5hsNr3vJ0U0EzR/UXCjoZbOU2Si2E=; path=/; expires=Sun, 02-Oct-22 10:28:46 GMT; domain=.whatismyipaddress.com; HttpOnly; SameSite=None
Server: cloudflare
CF-RAY: 753c94dd9edbb8f0-AMS
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.yahoo.comIN AResponsewww.yahoo.comIN CNAMEnew-fp-shed.wg1.b.yahoo.comnew-fp-shed.wg1.b.yahoo.comIN A87.248.100.215new-fp-shed.wg1.b.yahoo.comIN A87.248.100.216
-
Remote address:87.248.100.215:80RequestGET / HTTP/1.1
Host: www.yahoo.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Server: ATS
Cache-Control: no-store, no-cache
Content-Type: text/html
Content-Language: en
Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://*.autoblog.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lang=en-US&device=desktop&yrid=4tqlftthjio6o&partner=;
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; report="https://csp.yahoo.com/beacon/csp?src=fp-hpkp-www"
Location: https://www.yahoo.com/
Content-Length: 8
-
Remote address:8.8.8.8:53Requestzhniyd.infoIN AResponsezhniyd.infoIN A167.99.35.88
-
Remote address:167.99.35.88:80RequestGET / HTTP/1.1
Host: zhniyd.info
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 204 No Content
Date: Sun, 02 Oct 2022 09:58:48 GMT
Connection: close
X-Sinkhole: Malware
-
Remote address:8.8.8.8:53Requestgqiyauqg.comIN AResponse
-
Remote address:8.8.8.8:53Requestbsxoeurlxwb.infoIN AResponse
-
Remote address:8.8.8.8:53Requestgogpymlbjkb.netIN AResponse
-
Remote address:8.8.8.8:53Requestlmzckkakf.comIN AResponse
-
Remote address:8.8.8.8:53Requestxdiyvumeld.infoIN AResponse
-
Remote address:8.8.8.8:53Requestdwscdkekw.netIN AResponsedwscdkekw.netIN A72.251.233.245
-
Remote address:72.251.233.245:80RequestGET / HTTP/1.1
Host: dwscdkekw.net
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Oct 2022 09:59:07 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=349844230eb2588e829f8e491d6ff770|154.61.71.51|1664704747|1664704747|0|1|0; path=/; domain=.dwscdkekw.net; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=154.61.71.51; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Requestlzavzwvp.netIN AResponse
-
Remote address:8.8.8.8:53Requestytqplhtfqd.netIN AResponse
-
Remote address:8.8.8.8:53Requestdculevuvlfhv.netIN AResponse
-
Remote address:8.8.8.8:53Requestcmkeoo.comIN AResponsecmkeoo.comIN A173.231.189.15
-
Remote address:173.231.189.15:80RequestGET / HTTP/1.1
Host: cmkeoo.com
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Connection: close
ResponseHTTP/1.1 200 OK
Date: Sun, 02 Oct 2022 09:59:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=fc18611e79f47274e6ab8cc55b5f8ddd|154.61.71.51|1664704756|1664704756|0|1|0; path=/; domain=.cmkeoo.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=154.61.71.51; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Requestokduoanettj.netIN AResponse
-
Remote address:8.8.8.8:53Requestgcyyaq.comIN AResponse
-
Remote address:8.8.8.8:53Requestglxgoelknq.infoIN AResponse
-
Remote address:8.8.8.8:53Requestbyrggkjz.netIN AResponse
-
Remote address:8.8.8.8:53Requestyoqgoiugmkao.orgIN AResponse
-
Remote address:8.8.8.8:53Requestesswqagcmm.orgIN AResponse
-
Remote address:8.8.8.8:53Requesttxlsaadaqr.infoIN AResponse
-
Remote address:8.8.8.8:53Requestaesmqoes.orgIN AResponse
-
Remote address:8.8.8.8:53Requestwyyomeigaskk.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzodfybnldv.infoIN AResponse
-
Remote address:8.8.8.8:53Requestawcijmikwep.netIN AResponse
-
Remote address:8.8.8.8:53Requestjgpskt.infoIN AResponse
-
365 B 861 B 4 3
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
413 B 863 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
367 B 807 B 4 3
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
408 B 879 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
365 B 861 B 4 3
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
413 B 855 B 5 4
HTTP Request
GET http://www.showmyipaddress.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
408 B 871 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
408 B 873 B 5 4
HTTP Request
GET http://www.whatismyip.com/HTTP Response
301 -
411 B 901 B 5 4
HTTP Request
GET http://whatismyipaddress.com/HTTP Response
403 -
403 B 1.2kB 5 4
HTTP Request
GET http://www.yahoo.com/HTTP Response
301 -
104 B 2
-
401 B 331 B 5 5
HTTP Request
GET http://zhniyd.info/HTTP Response
204 -
104 B 2
-
104 B 2
-
403 B 621 B 5 5
HTTP Request
GET http://dwscdkekw.net/HTTP Response
200 -
104 B 2
-
400 B 618 B 5 5
HTTP Request
GET http://cmkeoo.com/HTTP Response
200 -
104 B 2
-
104 B 2
-
104 B 2
-
104 B 2
-
152 B 120 B 3 3
-
52 B 1
-
-
67 B 99 B 1 1
DNS Request
whatismyipaddress.com
DNS Response
104.16.155.36104.16.154.36
-
63 B 130 B 1 1
DNS Request
www.whatismyip.ca
-
69 B 101 B 1 1
DNS Request
www.showmyipaddress.com
DNS Response
188.114.96.3188.114.97.3
-
68 B 116 B 1 1
DNS Request
whatismyip.everdot.org
-
64 B 96 B 1 1
DNS Request
www.whatismyip.com
DNS Response
104.21.89.158172.67.189.152
-
59 B 123 B 1 1
DNS Request
www.yahoo.com
DNS Response
87.248.100.21587.248.100.216
-
57 B 73 B 1 1
DNS Request
zhniyd.info
DNS Response
167.99.35.88
-
58 B 131 B 1 1
DNS Request
gqiyauqg.com
-
62 B 141 B 1 1
DNS Request
bsxoeurlxwb.info
-
61 B 134 B 1 1
DNS Request
gogpymlbjkb.net
-
59 B 132 B 1 1
DNS Request
lmzckkakf.com
-
61 B 140 B 1 1
DNS Request
xdiyvumeld.info
-
59 B 75 B 1 1
DNS Request
dwscdkekw.net
DNS Response
72.251.233.245
-
58 B 131 B 1 1
DNS Request
lzavzwvp.net
-
60 B 133 B 1 1
DNS Request
ytqplhtfqd.net
-
62 B 135 B 1 1
DNS Request
dculevuvlfhv.net
-
56 B 72 B 1 1
DNS Request
cmkeoo.com
DNS Response
173.231.189.15
-
61 B 134 B 1 1
DNS Request
okduoanettj.net
-
56 B 129 B 1 1
DNS Request
gcyyaq.com
-
61 B 140 B 1 1
DNS Request
glxgoelknq.info
-
58 B 131 B 1 1
DNS Request
byrggkjz.net
-
62 B 144 B 1 1
DNS Request
yoqgoiugmkao.org
-
60 B 142 B 1 1
DNS Request
esswqagcmm.org
-
61 B 140 B 1 1
DNS Request
txlsaadaqr.info
-
58 B 140 B 1 1
DNS Request
aesmqoes.org
-
62 B 144 B 1 1
DNS Request
wyyomeigaskk.org
-
61 B 140 B 1 1
DNS Request
zodfybnldv.info
-
61 B 134 B 1 1
DNS Request
awcijmikwep.net
-
57 B 136 B 1 1
DNS Request
jgpskt.info
-
-
-
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
320KB
MD55edabb7ecbbaeeb8b5062aa39b42663d
SHA1c6299767e96c25ec4ad2bcf9bb922d1dbba0c21d
SHA2569d7052b721680908b37f14a0c61f82172e164228564424d593d49b8ab6f346e0
SHA512b8652d20e4fcde42456eff15571c1a8b6e2bc30bdbbe21dff85d97ceb3b7cb4fbafbc53295ebac870e4d04fbc668f5a9af196e1664dd89716bb481486dc5e14c
-
Filesize
320KB
MD55edabb7ecbbaeeb8b5062aa39b42663d
SHA1c6299767e96c25ec4ad2bcf9bb922d1dbba0c21d
SHA2569d7052b721680908b37f14a0c61f82172e164228564424d593d49b8ab6f346e0
SHA512b8652d20e4fcde42456eff15571c1a8b6e2bc30bdbbe21dff85d97ceb3b7cb4fbafbc53295ebac870e4d04fbc668f5a9af196e1664dd89716bb481486dc5e14c
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
1016KB
MD570a155e2e1122d8e447f1e35da521820
SHA135023c7ed32bd11d30fccd0dedaf0c19a24bebb9
SHA256d6705906a84d4334f1a3fe2b543ce60c9a8acfc568dfdff79cd14760e5e6c50a
SHA512a473ac08d98e5c0f760985b28cb80074c538499f866e1624368606ad6ebccf8d3a79adc2443d899849123a781aedc596d0624a44d8a6dd35d77c3874175ec41f
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
716KB
MD5aa8be50320d5d1995e06948fe45a361c
SHA1823fa3ece3cb3e4c57637a165a9e9666e85558b7
SHA2568f8ef9edeb250717e9241881d50d268ef6f72811ec750a8aa0cf0c4ebf4e69f5
SHA51248b2c816e71c9f6d0c9c7bb160247b625174454b0f5ffa202aefe9722121d1920f63a8011170dc3a9f9d3b512ec3e3a9a8d952d95748cffb9e64bc2884950de9
-
Filesize
320KB
MD55edabb7ecbbaeeb8b5062aa39b42663d
SHA1c6299767e96c25ec4ad2bcf9bb922d1dbba0c21d
SHA2569d7052b721680908b37f14a0c61f82172e164228564424d593d49b8ab6f346e0
SHA512b8652d20e4fcde42456eff15571c1a8b6e2bc30bdbbe21dff85d97ceb3b7cb4fbafbc53295ebac870e4d04fbc668f5a9af196e1664dd89716bb481486dc5e14c
-
Filesize
320KB
MD55edabb7ecbbaeeb8b5062aa39b42663d
SHA1c6299767e96c25ec4ad2bcf9bb922d1dbba0c21d
SHA2569d7052b721680908b37f14a0c61f82172e164228564424d593d49b8ab6f346e0
SHA512b8652d20e4fcde42456eff15571c1a8b6e2bc30bdbbe21dff85d97ceb3b7cb4fbafbc53295ebac870e4d04fbc668f5a9af196e1664dd89716bb481486dc5e14c