Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2022, 23:16 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe
Resource
win10v2004-20220812-en
General
-
Target
c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe
-
Size
80KB
-
MD5
08c8af5373c5a02aadfaf9e5beb1a100
-
SHA1
09b79e91c93d2bfe26881d1c267a2c5b3f06d709
-
SHA256
c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
-
SHA512
c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
SSDEEP
768:Rvf5BMCddWyabWzq1oskfbI+W9zR4tOEN9DGp5eHNWhCrP42M:d53abeaoFfbM9zRQFNsSHNSX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe -
Disables RegEdit via registry modification 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Executes dropped EXE 5 IoCs
pid Process 5048 smss.exe 4868 winlogon.exe 1296 services.exe 116 lsass.exe 2112 inetinfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\ElnorB.exe\"" inetinfo.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\ShellNew\ElnorB.exe c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe smss.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe winlogon.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe services.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe lsass.exe File opened for modification C:\Windows\ShellNew\ElnorB.exe inetinfo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 5048 smss.exe 4868 winlogon.exe 1296 services.exe 116 lsass.exe 2112 inetinfo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3208 wrote to memory of 3752 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 81 PID 3208 wrote to memory of 3752 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 81 PID 3208 wrote to memory of 3752 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 81 PID 3208 wrote to memory of 5048 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 82 PID 3208 wrote to memory of 5048 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 82 PID 3208 wrote to memory of 5048 3208 c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe 82 PID 5048 wrote to memory of 4868 5048 smss.exe 83 PID 5048 wrote to memory of 4868 5048 smss.exe 83 PID 5048 wrote to memory of 4868 5048 smss.exe 83 PID 5048 wrote to memory of 1028 5048 smss.exe 85 PID 5048 wrote to memory of 1028 5048 smss.exe 85 PID 5048 wrote to memory of 1028 5048 smss.exe 85 PID 5048 wrote to memory of 1292 5048 smss.exe 87 PID 5048 wrote to memory of 1292 5048 smss.exe 87 PID 5048 wrote to memory of 1292 5048 smss.exe 87 PID 5048 wrote to memory of 1296 5048 smss.exe 88 PID 5048 wrote to memory of 1296 5048 smss.exe 88 PID 5048 wrote to memory of 1296 5048 smss.exe 88 PID 5048 wrote to memory of 116 5048 smss.exe 90 PID 5048 wrote to memory of 116 5048 smss.exe 90 PID 5048 wrote to memory of 116 5048 smss.exe 90 PID 5048 wrote to memory of 2112 5048 smss.exe 91 PID 5048 wrote to memory of 2112 5048 smss.exe 91 PID 5048 wrote to memory of 2112 5048 smss.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe"C:\Users\Admin\AppData\Local\Temp\c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Modifies registry class
PID:3752
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵PID:1028
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bararontok.com"3⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:116
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
Network
-
Remote address:8.8.8.8:53Request226.101.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A142.250.179.142
-
Remote address:8.8.8.8:53Requestwww.geocities.comIN AResponsewww.geocities.comIN CNAMEgeocities.comgeocities.comIN A106.10.248.150geocities.comIN A98.136.103.23geocities.comIN A212.82.100.150geocities.comIN A124.108.115.100geocities.comIN A74.6.136.150
-
Remote address:106.10.248.150:80RequestGET /sdotlobxp/BrontokInf4.txt HTTP/1.1
User-Agent: Brontok.A3 Browser
Host: www.geocities.com
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Via: http/1.1 src6.ops.sg3.yahoo.com (ApacheTrafficServer)
Server: ATS
Cache-Control: no-store
Content-Type: text/html
Content-Language: en
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Content-Security-Policy: sandbox allow-scripts; default-src 'self'; img-src https:; style-src 'unsafe-inline'; script-src 'unsafe-inline'; report-uri http://csp.yahoo.com/beacon/csp?src=redirect
Location: http://yahoo.com/
Content-Length: 4401
-
Remote address:106.10.248.150:80RequestGET /sdotlobxp/Host4.txt HTTP/1.1
User-Agent: Brontok.A3 Browser
Host: www.geocities.com
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Via: http/1.1 src6.ops.sg3.yahoo.com (ApacheTrafficServer)
Server: ATS
Cache-Control: no-store
Content-Type: text/html
Content-Language: en
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Content-Security-Policy: sandbox allow-scripts; default-src 'self'; img-src https:; style-src 'unsafe-inline'; script-src 'unsafe-inline'; report-uri http://csp.yahoo.com/beacon/csp?src=redirect
Location: http://yahoo.com/
Content-Length: 4395
-
Remote address:8.8.8.8:53Requestyahoo.comIN AResponseyahoo.comIN A74.6.231.21yahoo.comIN A74.6.143.26yahoo.comIN A98.137.11.164yahoo.comIN A74.6.143.25yahoo.comIN A74.6.231.20yahoo.comIN A98.137.11.163
-
Remote address:74.6.231.21:80RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Host: yahoo.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Server: ATS
Cache-Control: no-store, no-cache
Content-Type: text/html
Content-Language: en
X-Frame-Options: SAMEORIGIN
Location: https://yahoo.com/
Content-Length: 8
-
Remote address:74.6.231.21:443RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Connection: Keep-Alive
Host: yahoo.com
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Strict-Transport-Security: max-age=31536000
Server: ATS
Cache-Control: no-store, no-cache
Content-Type: text/html
Content-Language: en
X-Frame-Options: SAMEORIGIN
Expect-CT: max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Referrer-Policy: no-referrer-when-downgrade
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Location: https://www.yahoo.com/
Content-Length: 8
-
Remote address:8.8.8.8:53Requestwww.yahoo.comIN AResponsewww.yahoo.comIN CNAMEnew-fp-shed.wg1.b.yahoo.comnew-fp-shed.wg1.b.yahoo.comIN A87.248.100.216new-fp-shed.wg1.b.yahoo.comIN A87.248.100.215
-
Remote address:87.248.100.216:443RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Connection: Keep-Alive
Host: www.yahoo.com
ResponseHTTP/1.1 200 OK
referrer-policy: no-referrer-when-downgrade
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
content-type: text/html; charset=utf-8
date: Sat, 03 Dec 2022 00:35:55 GMT
x-envoy-upstream-service-time: 25
server: ATS
Age: 0
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: no-store, no-cache, max-age=0, private
Expires: -1
Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.pnr.ouryahoo.com https://pnr.ouryahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://*.autoblog.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lang=en-US&device=desktop&yrid=374r7plhol6fb&partner=;
-
Remote address:8.8.8.8:53Requestgoogle.comIN A
-
Remote address:8.8.8.8:53Requestgoogle.comIN A
-
Remote address:8.8.8.8:53Requestgoogle.comIN A
-
Remote address:8.8.8.8:53Requestgoogle.comIN A
-
Remote address:8.8.8.8:53Requestgoogle.comIN A
-
Remote address:8.8.8.8:53Requestyahoo.comIN AResponseyahoo.comIN A98.137.11.163yahoo.comIN A74.6.143.25yahoo.comIN A74.6.231.20yahoo.comIN A74.6.143.26yahoo.comIN A74.6.231.21yahoo.comIN A98.137.11.164
-
Remote address:98.137.11.164:80RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Host: yahoo.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Server: ATS
Cache-Control: no-store, no-cache
Content-Type: text/html
Content-Language: en
X-Frame-Options: SAMEORIGIN
Location: https://yahoo.com/
Content-Length: 8
-
Remote address:98.137.11.164:443RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Connection: Keep-Alive
Host: yahoo.com
ResponseHTTP/1.1 301 Moved Permanently
Connection: keep-alive
Strict-Transport-Security: max-age=31536000
Server: ATS
Cache-Control: no-store, no-cache
Content-Type: text/html
Content-Language: en
X-Frame-Options: SAMEORIGIN
Expect-CT: max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Referrer-Policy: no-referrer-when-downgrade
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Location: https://www.yahoo.com/
Content-Length: 8
-
Remote address:87.248.100.216:443RequestGET / HTTP/1.1
User-Agent: Brontok.A3 Browser
Cache-Control: no-cache
Connection: Keep-Alive
Host: www.yahoo.com
ResponseHTTP/1.1 200 OK
referrer-policy: no-referrer-when-downgrade
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
content-type: text/html; charset=utf-8
date: Sat, 03 Dec 2022 00:36:57 GMT
x-envoy-upstream-service-time: 44
server: ATS
Age: 0
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: no-store, no-cache, max-age=0, private
Expires: -1
Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.pnr.ouryahoo.com https://pnr.ouryahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://*.autoblog.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=frontpage®ion=US&lang=en-US&device=desktop&yrid=3cumo8thol6h9&partner=;
-
260 B 5
-
322 B 7
-
836 B 10.4kB 13 10
HTTP Request
GET http://www.geocities.com/sdotlobxp/BrontokInf4.txtHTTP Response
301HTTP Request
GET http://www.geocities.com/sdotlobxp/Host4.txtHTTP Response
301 -
392 B 488 B 6 5
HTTP Request
GET http://yahoo.com/HTTP Response
301 -
1.1kB 5.1kB 15 11
HTTP Request
GET https://yahoo.com/HTTP Response
301 -
46 B 40 B 1 1
-
25.3kB 730.8kB 542 537
HTTP Request
GET https://www.yahoo.com/HTTP Response
200 -
260 B 5
-
322 B 7
-
260 B 5
-
346 B 408 B 5 3
HTTP Request
GET http://yahoo.com/HTTP Response
301 -
982 B 965 B 9 6
HTTP Request
GET https://yahoo.com/HTTP Response
301 -
25.3kB 726.5kB 537 534
HTTP Request
GET https://www.yahoo.com/HTTP Response
200
-
73 B 147 B 1 1
DNS Request
226.101.242.52.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
142.250.179.142
-
63 B 157 B 1 1
DNS Request
www.geocities.com
DNS Response
106.10.248.15098.136.103.23212.82.100.150124.108.115.10074.6.136.150
-
55 B 151 B 1 1
DNS Request
yahoo.com
DNS Response
74.6.231.2174.6.143.2698.137.11.16474.6.143.2574.6.231.2098.137.11.163
-
59 B 123 B 1 1
DNS Request
www.yahoo.com
DNS Response
87.248.100.21687.248.100.215
-
280 B 5
DNS Request
google.com
DNS Request
google.com
DNS Request
google.com
DNS Request
google.com
DNS Request
google.com
-
55 B 151 B 1 1
DNS Request
yahoo.com
DNS Response
98.137.11.16374.6.143.2574.6.231.2074.6.143.2674.6.231.2198.137.11.164
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0
-
Filesize
80KB
MD508c8af5373c5a02aadfaf9e5beb1a100
SHA109b79e91c93d2bfe26881d1c267a2c5b3f06d709
SHA256c00c2ee8a103e5780685d38c4a8d250203dc1da9757a2dee08e10a7c3d84a4d8
SHA512c35e32b502de3e34c14eeb873daed86b90e2ce618413e5e20629c45e1a28fd183dc70aa76248ec539777f064af59aaa1fd7bd61115ef210d64f484ae0978bfe0