Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 23:02 UTC

General

  • Target

    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe

  • Size

    10.3MB

  • MD5

    8199091c471810e292ce733d456aec04

  • SHA1

    539f6b6d7b818fb02d5613fefdba7dcc63d8d91d

  • SHA256

    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa

  • SHA512

    d1041b0d3322eda6ff27d07e3d72c91c36c4408bd10e13e7dcf8474cab9d66c70bd55c7cbfbebe43b9ce267d861060a2a45168dcda85af461e7a538869476f1c

  • SSDEEP

    196608:E9TMF9bVn1q2R93lJwP+VeQSPdWHqNFnuv/6/1iPXFi0B9fbCbpp6ZwXW6:8I9bN1BR91Jq+oEE//CzClplv

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 40 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 14 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    "C:\Users\Admin\AppData\Local\Temp\334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\downNew.exe
      "C:\Users\Admin\AppData\Local\Temp\downNew.exe" 22.6 24.6 http://s-bj-7575-update.oss.dogecdn.com/X%E6%88%98%E8%AD%A6%E5%89%8D%E5%8F%B0V24.6.zip ÓÅ»¯ C:\Users\Admin\AppData\Local\Temp\334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe XÕ½¾¯Ç°Ì¨ 24.6 XÕ½¾¯Ç°Ì¨V24.6 ¼Ù
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2468

Network

  • flag-us
    DNS
    weixin.qq.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    weixin.qq.com
    IN A
    Response
    weixin.qq.com
    IN CNAME
    minorshort.weixin.qq.com
    minorshort.weixin.qq.com
    IN A
    43.129.254.124
    minorshort.weixin.qq.com
    IN A
    43.154.254.90
  • flag-us
    DNS
    www.yy.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    www.yy.com
    IN A
    Response
    www.yy.com
    IN A
    106.38.197.51
    www.yy.com
    IN A
    103.227.121.120
  • flag-us
    DNS
    soso.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    soso.com
    IN A
    Response
    soso.com
    IN CNAME
    e.proxy.sogou.com
    e.proxy.sogou.com
    IN A
    119.28.109.132
  • flag-sg
    GET
    http://soso.com/
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    119.28.109.132:80
    Request
    GET / HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: http://soso.com/
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: soso.com
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 14 Oct 2023 10:52:33 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: ABTEST=1|1697280753|v17; expires=Mon, 13-Nov-23 10:52:33 GMT; path=/
    P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
    Set-Cookie: IPLOC=MU; expires=Sun, 13-Oct-24 10:52:33 GMT; domain=.soso.com; path=/
    P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
    Set-Cookie: SUID=0D473D9A8330A40A00000000652A72F1; expires=Fri, 09-Oct-2043 10:52:33 GMT; domain=.soso.com; path=/
    P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
    Expires: Sat, 14 Oct 2023 10:52:33 GMT
    Cache-Control: max-age=0
  • flag-us
    DNS
    note.youdao.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    note.youdao.com
    IN A
    Response
    note.youdao.com
    IN CNAME
    note.ntes53.netease.com
    note.ntes53.netease.com
    IN CNAME
    note.youdao.com.163jiasu.com
    note.youdao.com.163jiasu.com
    IN CNAME
    note.youdao.com.w.kunluncan.com
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.227
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.224
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.230
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.229
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.228
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.231
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.226
    note.youdao.com.w.kunluncan.com
    IN A
    47.246.48.225
  • flag-nl
    GET
    https://note.youdao.com/yws/api/group/92858460/note/907528482?method=get-content&shareToken=44E1DADF7F6F4F969025BE3C36133EC2&editorType=1
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    47.246.48.227:443
    Request
    GET /yws/api/group/92858460/note/907528482?method=get-content&shareToken=44E1DADF7F6F4F969025BE3C36133EC2&editorType=1 HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: https://note.youdao.com/yws/api/group/92858460/note/907528482?method=get-content&shareToken=44E1DADF7F6F4F969025BE3C36133EC2&editorType=1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: note.youdao.com
    Response
    HTTP/1.1 200 OK
    Server: Tengine
    Content-Type: text/html;charset=UTF-8
    Content-Length: 2690
    Connection: keep-alive
    Vary: Accept-Encoding
    Date: Sat, 14 Oct 2023 10:52:35 GMT
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Cache-Control: no-cache, no-store, must-revalidate
    Expires: Thu, 01 Jan 1970 00:00:00 GMT
    Pragma: no-cache
    Vary: Accept-Encoding
    Ali-Swift-Global-Savetime: 1697280755
    Via: cache20.l2de2[527,526,200-0,M], cache21.l2de2[529,0], cache8.nl2[556,555,200-0,M], cache5.nl2[562,0]
    X-Cache: MISS TCP_MISS dirn:-2:-2
    X-Swift-SaveTime: Sat, 14 Oct 2023 10:52:35 GMT
    X-Swift-CacheTime: 0
    cdn-user-ip: 154.61.71.13
    cdn-source: ali
    cdn-ip: 47.246.48.227
    Timing-Allow-Origin: *
    EagleId: 2ff6309916972807550414584e
  • flag-nl
    GET
    https://note.youdao.com/yws/api/group/92858460/share?method=get&shareToken=3F4F4221680340809FB626100F6A4275
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    47.246.48.227:443
    Request
    GET /yws/api/group/92858460/share?method=get&shareToken=3F4F4221680340809FB626100F6A4275 HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: https://note.youdao.com/yws/api/group/92858460/share?method=get&shareToken=3F4F4221680340809FB626100F6A4275
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: note.youdao.com
    Response
    HTTP/1.1 200 OK
    Server: Tengine
    Content-Type: text/json;charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Date: Sat, 14 Oct 2023 10:52:42 GMT
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Cache-Control: no-cache, no-store, must-revalidate
    Expires: Thu, 01 Jan 1970 00:00:00 GMT
    Pragma: no-cache
    Ali-Swift-Global-Savetime: 1697280762
    Via: cache2.l2de2[260,259,200-0,M], cache1.l2de2[261,0], cache4.nl2[268,268,200-0,M], cache5.nl2[274,0]
    X-Cache: MISS TCP_MISS dirn:-2:-2
    X-Swift-SaveTime: Sat, 14 Oct 2023 10:52:42 GMT
    X-Swift-CacheTime: 0
    cdn-user-ip: 154.61.71.13
    cdn-source: ali
    cdn-ip: 47.246.48.227
    Timing-Allow-Origin: *
    EagleId: 2ff6309916972807623253772e
  • flag-nl
    GET
    https://note.youdao.com/yws/api/group/92858460/file/1416490037?method=download&inline=true&version=1&shareToken=3F4F4221680340809FB626100F6A4275
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    47.246.48.227:443
    Request
    GET /yws/api/group/92858460/file/1416490037?method=download&inline=true&version=1&shareToken=3F4F4221680340809FB626100F6A4275 HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: https://note.youdao.com/yws/api/group/92858460/file/1416490037?method=download&inline=true&version=1&shareToken=3F4F4221680340809FB626100F6A4275
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: note.youdao.com
    Response
    HTTP/1.1 200 OK
    Server: Tengine
    Content-Type: application/octet-stream
    Content-Length: 2955776
    Connection: keep-alive
    Date: Sat, 14 Oct 2023 10:52:43 GMT
    Expires: Sat, 21 Oct 2023 10:52:43 GMT
    Cache-Control: max-age=604800
    Content-Disposition: inline; filename="HPSocket4C.dll"
    Ali-Swift-Global-Savetime: 1697280763
    Via: cache21.l2de2[840,839,200-0,M], cache1.l2de2[842,0], cache3.nl2[848,848,200-0,M], cache5.nl2[854,0]
    X-Cache: MISS TCP_MISS dirn:-2:-2
    X-Swift-SaveTime: Sat, 14 Oct 2023 10:52:43 GMT
    X-Swift-CacheTime: 0
    cdn-user-ip: 154.61.71.13
    cdn-source: ali
    cdn-ip: 47.246.48.227
    Timing-Allow-Origin: *
    EagleId: 2ff6309916972807626485149e
  • flag-us
    DNS
    buy.vmall.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    buy.vmall.com
    IN A
    Response
    buy.vmall.com
    IN A
    121.36.78.108
  • flag-us
    DNS
    www.aikukeji.cn
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    www.aikukeji.cn
    IN A
    Response
    www.aikukeji.cn
    IN CNAME
    aikukeji.w228.cndns5.com
    aikukeji.w228.cndns5.com
    IN A
    122.114.15.57
  • flag-us
    DNS
    www.aikukeji.cn
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    www.aikukeji.cn
    IN A
    Response
    www.aikukeji.cn
    IN CNAME
    aikukeji.w228.cndns5.com
    aikukeji.w228.cndns5.com
    IN A
    122.114.15.57
  • flag-cn
    GET
    http://www.aikukeji.cn/updateHPSocket.asp
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    122.114.15.57:80
    Request
    GET /updateHPSocket.asp HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: http://www.aikukeji.cn/updateHPSocket.asp
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: www.aikukeji.cn
    Response
    HTTP/1.1 200 OK
    Cache-Control: private
    Content-Length: 138
    Content-Type: text/html
    Set-Cookie: ASPSESSIONIDCQCQTAQB=ENBAONGAKOAGJOAHEPCNFECH; path=/; HttpOnly
    Set-Cookie: sdwaf-test-item=c6ab3507065304530956015602030d5f535a5450560757560006000304020200540d054b0756004d0f571f51031b0455; path=/; HttpOnly
    X-Powered-By: SDWAF
    Date: Sat, 14 Oct 2023 10:52:34 GMT
  • flag-us
    DNS
    buy.vmall.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    buy.vmall.com
    IN A
    Response
    buy.vmall.com
    IN A
    121.36.78.108
  • flag-us
    DNS
    www.vmall.com
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    www.vmall.com
    IN A
    Response
    www.vmall.com
    IN A
    121.36.48.86
  • flag-cn
    POST
    http://47.92.100.212:9980/xMan/SoftManage/getSoftInfo
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    47.92.100.212:9980
    Request
    POST /xMan/SoftManage/getSoftInfo HTTP/1.1
    Connection: Keep-Alive
    Content-Type: application/x-www-form-urlencoded; Charset=UTF-8
    Accept: */*
    Accept-Language: zh-cn
    Referer: http://47.92.100.212:9980/xMan/SoftManage/getSoftInfo
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Content-Length: 27
    Host: 47.92.100.212:9980
    Response
    HTTP/1.1 200 OK
    Expires: Thu, 01 Jan 1970 00:00:00 GMT
    Connection: keep-alive
    Cache-Control: no-cache
    Server: JFinal
    Pragma: no-cache
    Content-Type: application/json;charset=UTF-8
    Content-Length: 603
    Date: Sat, 14 Oct 2023 10:52:51 GMT
  • flag-cn
    GET
    http://www.aikukeji.cn/update.txt
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    122.114.15.57:80
    Request
    GET /update.txt HTTP/1.1
    Accept: */*
    Referer: http://www.aikukeji.cn/update.txt
    Accept-Language: zh-cn
    Content-Type: application/x-www-form-urlencoded
    User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
    Host: www.aikukeji.cn
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Content-Length: 259
    Content-Type: text/plain
    Last-Modified: Mon, 09 Oct 2023 15:39:33 GMT
    Accept-Ranges: bytes
    ETag: "c86811cdc6fad91:0"
    Set-Cookie: sdwaf-test-item=e2a1f151520701555606540109570302005d5d0508070a0404085103570a500c0c02001d5302054b50074a06084b5750; path=/; HttpOnly
    X-Powered-By: SDWAF
    Date: Sat, 14 Oct 2023 10:52:44 GMT
  • flag-us
    DNS
    cdn.fjwuping.cn
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    8.8.8.8:53
    Request
    cdn.fjwuping.cn
    IN A
    Response
    cdn.fjwuping.cn
    IN CNAME
    cdn.fjwuping.cn.s2-download.dogedns.com
    cdn.fjwuping.cn.s2-download.dogedns.com
    IN CNAME
    cdn.fjwuping.cn.cdn.dnsv1.com.cn
    cdn.fjwuping.cn.cdn.dnsv1.com.cn
    IN CNAME
    dcrmem1x.sched.dma.tdnsdl1.cn
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    221.204.165.214
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    119.167.147.208
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    221.204.16.245
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    116.153.64.103
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    221.204.16.62
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    116.153.64.183
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    116.153.64.78
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    27.221.71.187
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    221.204.16.190
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    36.250.243.5
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    119.188.60.138
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    116.136.170.162
    dcrmem1x.sched.dma.tdnsdl1.cn
    IN A
    221.204.165.234
  • flag-cn
    GET
    http://cdn.fjwuping.cn/update_exe/downNew.exe
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    Remote address:
    221.204.165.214:80
    Request
    GET /update_exe/downNew.exe HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: zh-cn
    Referer: http://cdn.fjwuping.cn/update_exe/downNew.exe
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
    Host: cdn.fjwuping.cn
    Response
    HTTP/1.1 200 OK
    Last-Modified: Mon, 09 Oct 2023 15:38:14 GMT
    Etag: "9b0680570024485e4d98f94473f5bed3-2"
    Content-Type: application/x-msdownload
    Date: Mon, 09 Oct 2023 21:10:47 GMT
    Server: tencent-cos
    x-cos-hash-crc64ecma: 7520062111888581877
    x-cos-request-id: NjUyNDZjNTdfM2U3NDc3MGJfMmMwZTBfNWEwNmQwMQ==
    Content-Length: 1347584
    Accept-Ranges: bytes
    X-NWS-LOG-UUID: 17625529056291079598
    Connection: keep-alive
    X-Cache-Lookup: Cache Hit
  • 43.129.254.124:443
    weixin.qq.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    347 B
    219 B
    5
    5
  • 43.129.254.124:443
    weixin.qq.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    288 B
    219 B
    5
    5
  • 106.38.197.51:443
    www.yy.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    344 B
    215 B
    5
    5
  • 106.38.197.51:443
    www.yy.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    288 B
    215 B
    5
    5
  • 119.28.109.132:80
    http://soso.com/
    http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    569 B
    7.0kB
    7
    8

    HTTP Request

    GET http://soso.com/

    HTTP Response

    200
  • 47.246.48.227:443
    https://note.youdao.com/yws/api/group/92858460/file/1416490037?method=download&inline=true&version=1&shareToken=3F4F4221680340809FB626100F6A4275
    tls, http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    55.4kB
    3.1MB
    1167
    2308

    HTTP Request

    GET https://note.youdao.com/yws/api/group/92858460/note/907528482?method=get-content&shareToken=44E1DADF7F6F4F969025BE3C36133EC2&editorType=1

    HTTP Response

    200

    HTTP Request

    GET https://note.youdao.com/yws/api/group/92858460/share?method=get&shareToken=3F4F4221680340809FB626100F6A4275

    HTTP Response

    200

    HTTP Request

    GET https://note.youdao.com/yws/api/group/92858460/file/1416490037?method=download&inline=true&version=1&shareToken=3F4F4221680340809FB626100F6A4275

    HTTP Response

    200
  • 121.36.78.108:443
    buy.vmall.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    347 B
    219 B
    5
    5
  • 121.36.78.108:443
    buy.vmall.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    340 B
    219 B
    6
    5
  • 122.114.15.57:80
    http://www.aikukeji.cn/updateHPSocket.asp
    http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    527 B
    598 B
    5
    2

    HTTP Request

    GET http://www.aikukeji.cn/updateHPSocket.asp

    HTTP Response

    200
  • 121.36.78.108:443
    buy.vmall.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    1.2kB
    4.4kB
    9
    9
  • 121.36.48.86:443
    www.vmall.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    347 B
    219 B
    5
    5
  • 121.36.48.86:443
    www.vmall.com
    tls
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    288 B
    219 B
    5
    5
  • 47.92.100.212:9980
    http://47.92.100.212:9980/xMan/SoftManage/getSoftInfo
    http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    1.2kB
    1.0kB
    7
    4

    HTTP Request

    POST http://47.92.100.212:9980/xMan/SoftManage/getSoftInfo

    HTTP Response

    200
  • 122.114.15.57:80
    http://www.aikukeji.cn/update.txt
    http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    500 B
    714 B
    5
    2

    HTTP Request

    GET http://www.aikukeji.cn/update.txt

    HTTP Response

    200
  • 221.204.165.214:80
    http://cdn.fjwuping.cn/update_exe/downNew.exe
    http
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    27.7kB
    1.4MB
    578
    994

    HTTP Request

    GET http://cdn.fjwuping.cn/update_exe/downNew.exe

    HTTP Response

    200
  • 8.8.8.8:53
    weixin.qq.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    59 B
    116 B
    1
    1

    DNS Request

    weixin.qq.com

    DNS Response

    43.129.254.124
    43.154.254.90

  • 8.8.8.8:53
    www.yy.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    56 B
    88 B
    1
    1

    DNS Request

    www.yy.com

    DNS Response

    106.38.197.51
    103.227.121.120

  • 8.8.8.8:53
    soso.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    54 B
    98 B
    1
    1

    DNS Request

    soso.com

    DNS Response

    119.28.109.132

  • 8.8.8.8:53
    note.youdao.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    61 B
    304 B
    1
    1

    DNS Request

    note.youdao.com

    DNS Response

    47.246.48.227
    47.246.48.224
    47.246.48.230
    47.246.48.229
    47.246.48.228
    47.246.48.231
    47.246.48.226
    47.246.48.225

  • 8.8.8.8:53
    buy.vmall.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    59 B
    75 B
    1
    1

    DNS Request

    buy.vmall.com

    DNS Response

    121.36.78.108

  • 8.8.8.8:53
    www.aikukeji.cn
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    122 B
    230 B
    2
    2

    DNS Request

    www.aikukeji.cn

    DNS Request

    www.aikukeji.cn

    DNS Response

    122.114.15.57

    DNS Response

    122.114.15.57

  • 8.8.8.8:53
    buy.vmall.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    59 B
    75 B
    1
    1

    DNS Request

    buy.vmall.com

    DNS Response

    121.36.78.108

  • 8.8.8.8:53
    www.vmall.com
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    59 B
    75 B
    1
    1

    DNS Request

    www.vmall.com

    DNS Response

    121.36.48.86

  • 8.8.8.8:53
    cdn.fjwuping.cn
    dns
    334b0146f08f2f23c5da72d82e7705836cc504e86e79e66e4e4b423c91ad1efa.exe
    61 B
    407 B
    1
    1

    DNS Request

    cdn.fjwuping.cn

    DNS Response

    221.204.165.214
    119.167.147.208
    221.204.16.245
    116.153.64.103
    221.204.16.62
    116.153.64.183
    116.153.64.78
    27.221.71.187
    221.204.16.190
    36.250.243.5
    119.188.60.138
    116.136.170.162
    221.204.165.234

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\downNew.exe

    Filesize

    1.3MB

    MD5

    40b2d7a36450f08a317428c52dc84ae3

    SHA1

    23a325537a84ed0811b04d6f8124284099672283

    SHA256

    95162c88c4514933e17cb2e8c95ca272b80d38c87992aa5af712901a2af965cf

    SHA512

    87b1674ba12ee3a0380ddf15b951d3a6474771f30f75dc1b4d990666d9cf5091521e9c625f4fe63839e097c48f54450b568c551f27acd39774bbf99fe4348a11

  • C:\Users\Admin\AppData\Local\Temp\downNew.exe

    Filesize

    1.3MB

    MD5

    40b2d7a36450f08a317428c52dc84ae3

    SHA1

    23a325537a84ed0811b04d6f8124284099672283

    SHA256

    95162c88c4514933e17cb2e8c95ca272b80d38c87992aa5af712901a2af965cf

    SHA512

    87b1674ba12ee3a0380ddf15b951d3a6474771f30f75dc1b4d990666d9cf5091521e9c625f4fe63839e097c48f54450b568c551f27acd39774bbf99fe4348a11

  • C:\Users\Admin\AppData\Local\Temp\downNew.exe

    Filesize

    1.3MB

    MD5

    40b2d7a36450f08a317428c52dc84ae3

    SHA1

    23a325537a84ed0811b04d6f8124284099672283

    SHA256

    95162c88c4514933e17cb2e8c95ca272b80d38c87992aa5af712901a2af965cf

    SHA512

    87b1674ba12ee3a0380ddf15b951d3a6474771f30f75dc1b4d990666d9cf5091521e9c625f4fe63839e097c48f54450b568c551f27acd39774bbf99fe4348a11

  • C:\Users\Admin\AppData\Local\Temp\lib\HPSocket4C.dll

    Filesize

    2.8MB

    MD5

    0d876831e50bdbe4ce2c4999dbfebaff

    SHA1

    207dfbc239789c98e50ac2d4d7cd94c2ab8569a4

    SHA256

    dc4936ca53cd4a2ef1fc3c4bafc53391afd434c6d9b2eb9ab6c527a32ee7b5f4

    SHA512

    df16aeadd39233f92d250581db48037aa55c836a34478018e38b37a47a618f1a32cf3fde8c1adadafac19d02e276c0d43f53216b2dc11f04fa24b4ebe15addd4

  • \Users\Admin\AppData\Local\Temp\downNew.exe

    Filesize

    1.3MB

    MD5

    40b2d7a36450f08a317428c52dc84ae3

    SHA1

    23a325537a84ed0811b04d6f8124284099672283

    SHA256

    95162c88c4514933e17cb2e8c95ca272b80d38c87992aa5af712901a2af965cf

    SHA512

    87b1674ba12ee3a0380ddf15b951d3a6474771f30f75dc1b4d990666d9cf5091521e9c625f4fe63839e097c48f54450b568c551f27acd39774bbf99fe4348a11

  • \Users\Admin\AppData\Local\Temp\downNew.exe

    Filesize

    1.3MB

    MD5

    40b2d7a36450f08a317428c52dc84ae3

    SHA1

    23a325537a84ed0811b04d6f8124284099672283

    SHA256

    95162c88c4514933e17cb2e8c95ca272b80d38c87992aa5af712901a2af965cf

    SHA512

    87b1674ba12ee3a0380ddf15b951d3a6474771f30f75dc1b4d990666d9cf5091521e9c625f4fe63839e097c48f54450b568c551f27acd39774bbf99fe4348a11

  • \Users\Admin\AppData\Local\Temp\lib\HPSocket4C.dll

    Filesize

    2.8MB

    MD5

    0d876831e50bdbe4ce2c4999dbfebaff

    SHA1

    207dfbc239789c98e50ac2d4d7cd94c2ab8569a4

    SHA256

    dc4936ca53cd4a2ef1fc3c4bafc53391afd434c6d9b2eb9ab6c527a32ee7b5f4

    SHA512

    df16aeadd39233f92d250581db48037aa55c836a34478018e38b37a47a618f1a32cf3fde8c1adadafac19d02e276c0d43f53216b2dc11f04fa24b4ebe15addd4

  • \Users\Admin\AppData\Local\Temp\libcurl.dll

    Filesize

    1.5MB

    MD5

    7323cb5e34ff064158f8c898e0f5537c

    SHA1

    a413c904bc12a9029d073194678a8a3dc0fd78e6

    SHA256

    33c1dcf45e4298c604037ba25fca7aef8bbe65dc019f20966ee37908b065aa21

    SHA512

    f29b36fefb5cf1f0b19a7e68fa0460c265ace1dbfbac62589025d448ade1d72038dcf8b2abc50d95c48d9ea229dd3d53bb2d4ee3f178ad26c7ab56f7a93b7725

  • memory/1760-38-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-96-0x0000000074170000-0x000000007442E000-memory.dmp

    Filesize

    2.7MB

  • memory/1760-17-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-20-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-22-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-24-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-26-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-28-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-30-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-32-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-76-0x0000000075CF0000-0x0000000075E00000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-36-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-0-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-40-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-42-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-44-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-46-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-48-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-50-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-52-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-54-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-56-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-57-0x0000000001EE0000-0x0000000001F04000-memory.dmp

    Filesize

    144KB

  • memory/1760-58-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1760-59-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-60-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1760-61-0x0000000001EE0000-0x0000000001F04000-memory.dmp

    Filesize

    144KB

  • memory/1760-65-0x0000000004020000-0x00000000040A3000-memory.dmp

    Filesize

    524KB

  • memory/1760-66-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-67-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-68-0x0000000075CF0000-0x0000000075E00000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-69-0x0000000075CF0000-0x0000000075E00000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-70-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1760-71-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1760-15-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-75-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-34-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-19-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-72-0x0000000077C00000-0x0000000077C01000-memory.dmp

    Filesize

    4KB

  • memory/1760-14-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-86-0x0000000003B50000-0x0000000003B51000-memory.dmp

    Filesize

    4KB

  • memory/1760-85-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/1760-88-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/1760-87-0x0000000004260000-0x0000000004261000-memory.dmp

    Filesize

    4KB

  • memory/1760-90-0x0000000004250000-0x0000000004251000-memory.dmp

    Filesize

    4KB

  • memory/1760-13-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/1760-77-0x0000000075CF0000-0x0000000075E00000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-104-0x0000000004240000-0x0000000004241000-memory.dmp

    Filesize

    4KB

  • memory/1760-105-0x0000000074170000-0x000000007442E000-memory.dmp

    Filesize

    2.7MB

  • memory/1760-107-0x0000000005120000-0x0000000005121000-memory.dmp

    Filesize

    4KB

  • memory/1760-106-0x0000000004260000-0x0000000004261000-memory.dmp

    Filesize

    4KB

  • memory/1760-12-0x0000000076000000-0x0000000076001000-memory.dmp

    Filesize

    4KB

  • memory/1760-6-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-8-0x0000000076000000-0x0000000076001000-memory.dmp

    Filesize

    4KB

  • memory/1760-124-0x0000000006180000-0x00000000064B6000-memory.dmp

    Filesize

    3.2MB

  • memory/1760-123-0x0000000004250000-0x0000000004251000-memory.dmp

    Filesize

    4KB

  • memory/1760-130-0x0000000006180000-0x00000000064B6000-memory.dmp

    Filesize

    3.2MB

  • memory/1760-3-0x0000000077C00000-0x0000000077C01000-memory.dmp

    Filesize

    4KB

  • memory/1760-1-0x0000000077C00000-0x0000000077C01000-memory.dmp

    Filesize

    4KB

  • memory/1760-177-0x0000000075CF0000-0x0000000075E00000-memory.dmp

    Filesize

    1.1MB

  • memory/1760-135-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1760-139-0x0000000000400000-0x0000000001E53000-memory.dmp

    Filesize

    26.3MB

  • memory/1760-145-0x0000000074170000-0x000000007442E000-memory.dmp

    Filesize

    2.7MB

  • memory/2468-149-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-152-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-155-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-158-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-161-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-164-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-167-0x0000000000400000-0x0000000000736000-memory.dmp

    Filesize

    3.2MB

  • memory/2468-169-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-173-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-176-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2468-133-0x0000000000400000-0x0000000000736000-memory.dmp

    Filesize

    3.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.