Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 08:49 UTC
Behavioral task
behavioral1
Sample
a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe
Resource
win7-20220812-en
General
-
Target
a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe
-
Size
73KB
-
MD5
ab115f0a6d01203b54f3d4b1a327b587
-
SHA1
bbb4761896d6f206f085ed5f0481b8e68f8e80d6
-
SHA256
a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687
-
SHA512
c047ca3e2c725df30284d8fbc06f88dd99588ae6c2c25f656060c21ecb055396018447aad65349e2261d9c9ff1b5e39caeb013665e8210d975abf4e95fba28da
-
SSDEEP
1536:bNCJMvSU05Ct8NwAJH7Bs3UHRazKxiH0vrb+cd8nouy8Z:bNiUQCt5Ia3SYPUvriGcoutZ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 2 IoCs
pid Process 4960 winlogon.exe 1360 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tracerpt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wink.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atguard.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7win.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spf.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscan.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgserv9.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\efpeadm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\norton_internet_secu_3.0_407.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcvsshld.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wrctrl.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zauinst.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwsc.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lockdown2000.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navauto-protect.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winsfcm.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieWUAU.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmgrdian.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecengine.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfservice.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcciomon.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonalarm.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgw.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avrescue.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monitor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pathping.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsecomr.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav8.0.0.357es.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccpxysvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ecmd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvc95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\smc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpcc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jed.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-pf-213-en-win.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ackwin32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpf.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds-3.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bs120.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mxtask.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\offguard.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\a2servic.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shn.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taumon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmntsrv.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmias.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Diskmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fprot95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\npssvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Procmon.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieRpcSs.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpfnt206.exe winlogon.exe -
resource yara_rule behavioral2/memory/4908-132-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/files/0x0007000000022e15-136.dat upx behavioral2/files/0x0007000000022e15-137.dat upx behavioral2/memory/4908-138-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4960-141-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4960-142-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1360-144-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0007000000022e15-145.dat upx behavioral2/memory/1360-147-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1360-148-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1360-151-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1360-152-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Monitoring winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\454474141434F435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\454474141434F435 = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4960 set thread context of 1360 4960 winlogon.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://678m3qamvbrz2o0.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1667031217" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://44c25m12cdp9v27.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001235" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://gz2oif411a2ml71.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://zl48g0kx69ic7aj.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://86j09l22pyd224c.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1667031217" IEXPLORE.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://395pfprm4nj36i9.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1663750783" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001235" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001235" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://57r66wy0u63l538.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1663750783" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://1rvy6po088pp1gb.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8D5E07C4-7686-11ED-BF5F-7A41DBBD5662} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://l19772ko05d8r44.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://g75e1s04040z0u2.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe 1360 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1360 winlogon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3180 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4908 a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe 4960 winlogon.exe 1360 winlogon.exe 3180 iexplore.exe 3180 iexplore.exe 4624 IEXPLORE.EXE 4624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4960 4908 a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe 84 PID 4908 wrote to memory of 4960 4908 a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe 84 PID 4908 wrote to memory of 4960 4908 a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe 84 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 4960 wrote to memory of 1360 4960 winlogon.exe 95 PID 3180 wrote to memory of 4624 3180 iexplore.exe 103 PID 3180 wrote to memory of 4624 3180 iexplore.exe 103 PID 3180 wrote to memory of 4624 3180 iexplore.exe 103 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe"C:\Users\Admin\AppData\Local\Temp\a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1360
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1324
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3180 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4624
-
Network
-
Remote address:8.8.8.8:53Requestwhos.amung.usIN AResponsewhos.amung.usIN A172.67.8.141whos.amung.usIN A104.22.74.171whos.amung.usIN A104.22.75.171
-
Remote address:8.8.8.8:53Requestspaon11524j.ipcheker.comIN AResponsespaon11524j.ipcheker.comIN A35.205.61.67
-
Remote address:8.8.8.8:53Requestwhos.amung.usIN AResponsewhos.amung.usIN A172.67.8.141whos.amung.usIN A104.22.74.171whos.amung.usIN A104.22.75.171
-
Remote address:8.8.8.8:53Requestxtt3j3pp3m0.ipgreat.comIN AResponse
-
Remote address:8.8.8.8:53Request97.97.242.52.in-addr.arpaIN PTRResponse
-
Remote address:104.22.74.171:80RequestGET /swidget/d23r523t4id HTTP/1.1
Host: whos.amung.us
ResponseHTTP/1.1 307 Temporary Redirect
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
cache-control: no-cache, no-store, must-revalidate
location: http://widgets.amung.us/small/00/2.png
CF-Cache-Status: DYNAMIC
Server: cloudflare
CF-RAY: 7760aeb24c51b8af-AMS
-
Remote address:8.8.8.8:53Requestwidgets.amung.usIN AResponsewidgets.amung.usIN A104.22.74.171widgets.amung.usIN A172.67.8.141widgets.amung.usIN A104.22.75.171
-
Remote address:104.22.74.171:80RequestGET /small/00/2.png HTTP/1.1
Host: widgets.amung.us
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 313
Connection: keep-alive
last-modified: Sun, 13 Jun 2010 09:48:29 GMT
etag: "4c14a96d-139"
expires: Sat, 03 Dec 2022 16:13:15 GMT
cache-control: max-age=2678400
access-control-allow-origin: *
CF-Cache-Status: HIT
Age: 454386
Accept-Ranges: bytes
Server: cloudflare
CF-RAY: 7760aeb46e280e3b-AMS
-
Remote address:8.8.8.8:53Request3vi4914078a7r73.youtubeta.comIN AResponse3vi4914078a7r73.youtubeta.comIN CNAMEpixie.porkbun.compixie.porkbun.comIN A44.227.65.245pixie.porkbun.comIN A44.227.76.166
-
Remote address:44.227.65.245:80RequestPOST /index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: [�_S�_][�_T�_][�_E�_][�_A�_][�_L�_][�_E�_][�_R�_]
Host: 3vi4914078a7r73.youtubeta.com
Content-Length: 37
Cache-Control: no-cache
ResponseHTTP/1.1 307 Temporary Redirect
Date: Wed, 07 Dec 2022 22:26:22 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 168
Connection: keep-alive
Location: http://youtubeta.com
X-Frame-Options: sameorigin
-
Remote address:8.8.8.8:53Requestl19772ko05d8r44.directorio-w.comIN AResponsel19772ko05d8r44.directorio-w.comIN A72.52.178.23
-
Remote address:8.8.8.8:53Requestwww.directorio-w.comIN AResponsewww.directorio-w.comIN A72.52.178.23
-
Remote address:72.52.178.23:80RequestGET / HTTP/1.1
Accept: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: www.directorio-w.com
Connection: Keep-Alive
ResponseHTTP/1.1 302 Moved Temporarily
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9
X-Powered-By: PHP/5.4.16
Location: http://ww7.directorio-w.com
Keep-Alive: timeout=5, max=84
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestww7.directorio-w.comIN AResponseww7.directorio-w.comIN CNAME62978.bodis.com62978.bodis.comIN A199.59.243.222
-
Remote address:199.59.243.222:80RequestGET / HTTP/1.1
Accept: text/html, application/xhtml+xml, image/jxr, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Connection: Keep-Alive
Host: ww7.directorio-w.com
ResponseHTTP/1.1 200 OK
Date: Wed, 07 Dec 2022 22:26:25 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0; expires=Wed, 07-Dec-2022 22:41:25 GMT; Max-Age=900; path=/; HttpOnly
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_TR1ZsR9oUacTOiUzTdO5wnq0Upxn3ov3EgKCAcSt2rhdmVhkhPHv2EnFg2SAlMYtbNkvsTGncDmDLS0OzEeG3Q==
Cache-Control: no-cache
Accept-CH: sec-ch-prefers-color-scheme
Critical-CH: sec-ch-prefers-color-scheme
Vary: sec-ch-prefers-color-scheme
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
-
Remote address:199.59.243.222:80RequestGET /js/parking.2.100.2.js HTTP/1.1
Accept: application/javascript, */*;q=0.8
Referer: http://ww7.directorio-w.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: ww7.directorio-w.com
Connection: Keep-Alive
Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0
ResponseHTTP/1.1 200 OK
Date: Wed, 07 Dec 2022 22:26:25 GMT
Content-Type: application/javascript; charset=utf-8
Last-Modified: Mon, 14 Nov 2022 17:45:15 GMT
Transfer-Encoding: chunked
Connection: keep-alive
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
-
Remote address:8.8.8.8:53Requestparking.bodiscdn.comIN AResponseparking.bodiscdn.comIN A104.22.40.120parking.bodiscdn.comIN A104.22.41.120parking.bodiscdn.comIN A172.67.5.15
-
Remote address:8.8.8.8:53Requestmkwm3jfy48v.ipcheker.comIN AResponsemkwm3jfy48v.ipcheker.comIN A35.205.61.67
-
Remote address:35.205.61.67:80RequestGET / HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:47 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|1|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|1|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:47 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|2|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|2|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:47 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|3|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452007|1670452007|0|3|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:48 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452008|1670452007|0|4|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452008|1670452007|0|4|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:49 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452009|1670452007|0|5|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452009|1670452007|0|5|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:49 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452009|1670452007|0|6|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:35.205.61.67:80RequestGET /1 HTTP/1.1
User-Agent: �����������Ī��������¥��������֡��ư���ä�ο���ʪ
Host: mkwm3jfy48v.ipcheker.com
Connection: Keep-Alive
Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452009|1670452007|0|6|0
ResponseHTTP/1.1 302 Moved Temporarily
Date: Wed, 07 Dec 2022 22:26:52 GMT
Content-Type: text/html
Connection: close
Set-Cookie: btst=fadb858121f6c720dae4491d7568d1e0|154.61.71.13|1670452012|1670452007|1|7|0; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
Location: 1
-
Remote address:199.59.243.222:80RequestPOST /_fd HTTP/1.1
Accept: application/json
Content-Type: application/json
Referer: http://ww7.directorio-w.com/
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Host: ww7.directorio-w.com
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: no-cache
Date: Wed, 07 Dec 2022 22:26:56 GMT
X-Version: 2.100.2
Set-Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0; expires=Wed, 07-Dec-2022 22:41:56 GMT; Max-Age=900; path=/; httponly
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
-
Remote address:199.59.243.222:80RequestGET /px.gif?ch=1&rn=1.16761255169662 HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Referer: http://ww7.directorio-w.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: ww7.directorio-w.com
Connection: Keep-Alive
Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0
ResponseHTTP/1.1 200 OK
Date: Wed, 07 Dec 2022 22:26:56 GMT
Content-Type: image/gif
Content-Length: 42
Last-Modified: Wed, 15 Sep 2021 19:38:30 GMT
Connection: keep-alive
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Accept-Ranges: bytes
-
Remote address:199.59.243.222:80RequestGET /px.gif?ch=2&rn=1.16761255169662 HTTP/1.1
Accept: image/png, image/svg+xml, image/jxr, image/*;q=0.8, */*;q=0.5
Referer: http://ww7.directorio-w.com/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
Accept-Encoding: gzip, deflate
Host: ww7.directorio-w.com
Connection: Keep-Alive
Cookie: parking_session=e104a6b9-7cf0-67b3-d6d7-d79e26dc56e0
ResponseHTTP/1.1 200 OK
Date: Wed, 07 Dec 2022 22:26:56 GMT
Content-Type: image/gif
Content-Length: 42
Last-Modified: Wed, 15 Sep 2021 19:38:30 GMT
Connection: keep-alive
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Accept-Ranges: bytes
-
46 B 40 B 1 1
-
322 B 7
-
260 B 5
-
322 B 7
-
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
40 B 1
-
260 B 5
-
260 B 5
-
260 B 5
-
242 B 479 B 4 3
HTTP Request
GET http://whos.amung.us/swidget/d23r523t4idHTTP Response
307 -
264 B 850 B 4 3
HTTP Request
GET http://widgets.amung.us/small/00/2.pngHTTP Response
200 -
489 B 577 B 5 4
HTTP Request
POST http://3vi4914078a7r73.youtubeta.com/index.phpHTTP Response
307 -
497 B 503 B 5 4
HTTP Request
GET http://www.directorio-w.com/HTTP Response
302 -
156 B 3
-
190 B 92 B 4 2
-
2.1kB 26.0kB 27 26
HTTP Request
GET http://ww7.directorio-w.com/HTTP Response
200HTTP Request
GET http://ww7.directorio-w.com/js/parking.2.100.2.jsHTTP Response
200 -
484 B 808 B 8 6
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/HTTP Response
302 -
505 B 486 B 6 5
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
505 B 446 B 6 4
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
551 B 486 B 7 5
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
689 B 808 B 10 6
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
505 B 486 B 6 5
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
655 B 486 B 9 5
HTTP Request
GET http://mkwm3jfy48v.ipcheker.com/1HTTP Response
302 -
208 B 4
-
744 B 4.7kB 7 6
HTTP Request
POST http://ww7.directorio-w.com/_fdHTTP Response
200 -
596 B 513 B 4 2
HTTP Request
GET http://ww7.directorio-w.com/px.gif?ch=1&rn=1.16761255169662HTTP Response
200 -
596 B 553 B 4 3
HTTP Request
GET http://ww7.directorio-w.com/px.gif?ch=2&rn=1.16761255169662HTTP Response
200
-
59 B 107 B 1 1
DNS Request
whos.amung.us
DNS Response
172.67.8.141104.22.74.171104.22.75.171
-
70 B 86 B 1 1
DNS Request
spaon11524j.ipcheker.com
DNS Response
35.205.61.67
-
59 B 107 B 1 1
DNS Request
whos.amung.us
DNS Response
172.67.8.141104.22.74.171104.22.75.171
-
69 B 142 B 1 1
DNS Request
xtt3j3pp3m0.ipgreat.com
-
71 B 145 B 1 1
DNS Request
97.97.242.52.in-addr.arpa
-
62 B 110 B 1 1
DNS Request
widgets.amung.us
DNS Response
104.22.74.171172.67.8.141104.22.75.171
-
75 B 135 B 1 1
DNS Request
3vi4914078a7r73.youtubeta.com
DNS Response
44.227.65.24544.227.76.166
-
78 B 94 B 1 1
DNS Request
l19772ko05d8r44.directorio-w.com
DNS Response
72.52.178.23
-
66 B 82 B 1 1
DNS Request
www.directorio-w.com
DNS Response
72.52.178.23
-
66 B 108 B 1 1
DNS Request
ww7.directorio-w.com
DNS Response
199.59.243.222
-
66 B 114 B 1 1
DNS Request
parking.bodiscdn.com
DNS Response
104.22.40.120104.22.41.120172.67.5.15
-
70 B 86 B 1 1
DNS Request
mkwm3jfy48v.ipcheker.com
DNS Response
35.205.61.67
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5ab115f0a6d01203b54f3d4b1a327b587
SHA1bbb4761896d6f206f085ed5f0481b8e68f8e80d6
SHA256a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687
SHA512c047ca3e2c725df30284d8fbc06f88dd99588ae6c2c25f656060c21ecb055396018447aad65349e2261d9c9ff1b5e39caeb013665e8210d975abf4e95fba28da
-
Filesize
73KB
MD5ab115f0a6d01203b54f3d4b1a327b587
SHA1bbb4761896d6f206f085ed5f0481b8e68f8e80d6
SHA256a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687
SHA512c047ca3e2c725df30284d8fbc06f88dd99588ae6c2c25f656060c21ecb055396018447aad65349e2261d9c9ff1b5e39caeb013665e8210d975abf4e95fba28da
-
Filesize
73KB
MD5ab115f0a6d01203b54f3d4b1a327b587
SHA1bbb4761896d6f206f085ed5f0481b8e68f8e80d6
SHA256a85040e7ecb3f06082b5292804267433e611040c89d835a8ffd3151b148ed687
SHA512c047ca3e2c725df30284d8fbc06f88dd99588ae6c2c25f656060c21ecb055396018447aad65349e2261d9c9ff1b5e39caeb013665e8210d975abf4e95fba28da