Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 00:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8c90a17cefedced2b98630afa28f7920.exe
Resource
win7-20231020-en
General
-
Target
NEAS.8c90a17cefedced2b98630afa28f7920.exe
-
Size
4.1MB
-
MD5
8c90a17cefedced2b98630afa28f7920
-
SHA1
b8292b3dc605ce173b3cfc0d9de0944b8b278ab9
-
SHA256
ffbcf05dc1a30b52874ef86c4dfccaf4574655c207af6ed93c8ed4edae653aee
-
SHA512
c5295e8c0929e9a9d908cc105908a4f7318a786162eaf5cf71644379023e8c110f2db0e0d55d1fa76e35d1c33d6f43992595ad6732c943187824361ce6c03741
-
SSDEEP
98304:56wfGO+WARBHdiTpzTh4RUV+TPF259TQ5zoA:sW+BRB9ihTha3j45hS
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/1760-2-0x0000000002F00000-0x00000000037EB000-memory.dmp family_glupteba behavioral2/memory/1760-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1760-4-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1760-6-0x0000000002F00000-0x00000000037EB000-memory.dmp family_glupteba behavioral2/memory/1760-7-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1760-61-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3828-64-0x0000000002F80000-0x000000000386B000-memory.dmp family_glupteba behavioral2/memory/3828-65-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3828-98-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3828-153-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3828-160-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-194-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-256-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-270-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-273-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-275-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-277-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1404-286-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2816 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 1404 csrss.exe 1556 injector.exe 1820 windefender.exe 4524 windefender.exe 4700 f801950a962ddba14caaa44bf084b55c.exe -
resource yara_rule behavioral2/files/0x0008000000022e84-266.dat upx behavioral2/files/0x0008000000022e84-268.dat upx behavioral2/files/0x0008000000022e84-269.dat upx behavioral2/memory/1820-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4524-274-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4524-278-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000a000000022d74-282.dat upx behavioral2/files/0x000a000000022d74-284.dat upx behavioral2/memory/4524-285-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4700-287-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral2/memory/4700-289-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN NEAS.8c90a17cefedced2b98630afa28f7920.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe NEAS.8c90a17cefedced2b98630afa28f7920.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss NEAS.8c90a17cefedced2b98630afa28f7920.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 980 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4016 1760 WerFault.exe 87 2272 3828 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe 4272 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" NEAS.8c90a17cefedced2b98630afa28f7920.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 432 powershell.exe 432 powershell.exe 432 powershell.exe 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe 2932 powershell.exe 2932 powershell.exe 2932 powershell.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 1564 powershell.exe 1564 powershell.exe 1564 powershell.exe 4964 powershell.exe 4964 powershell.exe 4964 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 2912 powershell.exe 2912 powershell.exe 1112 powershell.exe 1112 powershell.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1404 csrss.exe 1404 csrss.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1404 csrss.exe 1404 csrss.exe 1556 injector.exe 1556 injector.exe 1404 csrss.exe 1404 csrss.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe 1556 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe Token: SeImpersonatePrivilege 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeSystemEnvironmentPrivilege 1404 csrss.exe Token: SeSecurityPrivilege 980 sc.exe Token: SeSecurityPrivilege 980 sc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1760 wrote to memory of 432 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe 97 PID 1760 wrote to memory of 432 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe 97 PID 1760 wrote to memory of 432 1760 NEAS.8c90a17cefedced2b98630afa28f7920.exe 97 PID 3828 wrote to memory of 2932 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 107 PID 3828 wrote to memory of 2932 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 107 PID 3828 wrote to memory of 2932 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 107 PID 3828 wrote to memory of 4788 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 110 PID 3828 wrote to memory of 4788 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 110 PID 4788 wrote to memory of 2816 4788 cmd.exe 112 PID 4788 wrote to memory of 2816 4788 cmd.exe 112 PID 3828 wrote to memory of 1564 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 113 PID 3828 wrote to memory of 1564 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 113 PID 3828 wrote to memory of 1564 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 113 PID 3828 wrote to memory of 4964 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 115 PID 3828 wrote to memory of 4964 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 115 PID 3828 wrote to memory of 4964 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 115 PID 3828 wrote to memory of 1404 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 117 PID 3828 wrote to memory of 1404 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 117 PID 3828 wrote to memory of 1404 3828 NEAS.8c90a17cefedced2b98630afa28f7920.exe 117 PID 1404 wrote to memory of 4424 1404 csrss.exe 120 PID 1404 wrote to memory of 4424 1404 csrss.exe 120 PID 1404 wrote to memory of 4424 1404 csrss.exe 120 PID 1404 wrote to memory of 2912 1404 csrss.exe 125 PID 1404 wrote to memory of 2912 1404 csrss.exe 125 PID 1404 wrote to memory of 2912 1404 csrss.exe 125 PID 1404 wrote to memory of 1112 1404 csrss.exe 128 PID 1404 wrote to memory of 1112 1404 csrss.exe 128 PID 1404 wrote to memory of 1112 1404 csrss.exe 128 PID 1404 wrote to memory of 1556 1404 csrss.exe 131 PID 1404 wrote to memory of 1556 1404 csrss.exe 131 PID 1820 wrote to memory of 4156 1820 windefender.exe 137 PID 1820 wrote to memory of 4156 1820 windefender.exe 137 PID 1820 wrote to memory of 4156 1820 windefender.exe 137 PID 4156 wrote to memory of 980 4156 cmd.exe 138 PID 4156 wrote to memory of 980 4156 cmd.exe 138 PID 4156 wrote to memory of 980 4156 cmd.exe 138 PID 1404 wrote to memory of 4700 1404 csrss.exe 148 PID 1404 wrote to memory of 4700 1404 csrss.exe 148 PID 1404 wrote to memory of 4700 1404 csrss.exe 148 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8c90a17cefedced2b98630afa28f7920.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8c90a17cefedced2b98630afa28f7920.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8c90a17cefedced2b98630afa28f7920.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8c90a17cefedced2b98630afa28f7920.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2816
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2692
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4272
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:2800
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:4220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 8963⤵
- Program crash
PID:2272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 6682⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1760 -ip 17601⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3828 -ip 38281⤵PID:1476
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4524
Network
-
Remote address:8.8.8.8:53Request126.21.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=2A91805D35DD66FB3051939C3477679E; domain=.bing.com; expires=Sat, 30-Nov-2024 00:10:52 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8E230854E3804B2DB51BB925C7068B42 Ref B: DUS30EDGE0807 Ref C: 2023-11-06T00:10:52Z
date: Mon, 06 Nov 2023 00:10:52 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2A91805D35DD66FB3051939C3477679E
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E3DF56C700354F4DB17A7F7C00AF5651 Ref B: DUS30EDGE0807 Ref C: 2023-11-06T00:10:52Z
date: Mon, 06 Nov 2023 00:10:52 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2A91805D35DD66FB3051939C3477679E
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C34C71459EFD4D0B8C6956A27BF7AD30 Ref B: DUS30EDGE0807 Ref C: 2023-11-06T00:10:52Z
date: Mon, 06 Nov 2023 00:10:52 GMT
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request39.142.81.104.in-addr.arpaIN PTRResponse39.142.81.104.in-addr.arpaIN PTRa104-81-142-39deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.208.79.178.in-addr.arpaIN PTRResponse1.208.79.178.in-addr.arpaIN PTRhttps-178-79-208-1amsllnwnet
-
Remote address:8.8.8.8:53Request0347ef30-3d04-47d3-9589-662859d60ed8.uuid.filesdumpplace.orgIN TXTResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requeststun3.l.google.comIN AResponsestun3.l.google.comIN A74.125.24.127
-
Remote address:8.8.8.8:53Requestcdn.discordapp.comIN AResponsecdn.discordapp.comIN A162.159.135.233cdn.discordapp.comIN A162.159.130.233cdn.discordapp.comIN A162.159.133.233cdn.discordapp.comIN A162.159.129.233cdn.discordapp.comIN A162.159.134.233
-
Remote address:8.8.8.8:53Requestserver2.filesdumpplace.orgIN AResponseserver2.filesdumpplace.orgIN A185.82.216.96
-
Remote address:8.8.8.8:53Requestwalkinglate.comIN AResponsewalkinglate.comIN A188.114.96.0walkinglate.comIN A188.114.97.0
-
Remote address:8.8.8.8:53Request127.24.125.74.in-addr.arpaIN PTRResponse127.24.125.74.in-addr.arpaIN PTRsf-in-f1271e100net
-
Remote address:8.8.8.8:53Request233.135.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request96.216.82.185.in-addr.arpaIN PTRResponse96.216.82.185.in-addr.arpaIN PTRdedic-mariadebommarez-1201693hosted-by-itldccom
-
Remote address:8.8.8.8:53Request0.96.114.188.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301289_17HALS3A8X56K0I81&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301289_17HALS3A8X56K0I81&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 620744
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: B79D0B80422A42EB9CC827D030C92C6E Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:36Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300925_1WNJI31X17K21EZ5K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317300925_1WNJI31X17K21EZ5K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 552160
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 32E96958F90F41B4B2C662B545AB9C5B Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:36Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300910_1N1UYW7VSBMF6PTRK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317300910_1N1UYW7VSBMF6PTRK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 771656
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BA4C55DDE274401A8D3A187C89BD840F Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:36Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301698_1KQ57XUAVQMPU7APZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301698_1KQ57XUAVQMPU7APZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 420680
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3E97102322A74822A40042169769E5A9 Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:36Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301343_1I707L3L7BW4II7PP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301343_1I707L3L7BW4II7PP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 675336
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5180B9005C40401EAC484F9B950F4CE2 Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:36Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301358_1ZPBGXJ99CUBJXGTN&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301358_1ZPBGXJ99CUBJXGTN&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 529755
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D4CFF42C9AD34F47AC7F868ECE1072A5 Ref B: BRU30EDGE0514 Ref C: 2023-11-06T00:12:37Z
date: Mon, 06 Nov 2023 00:12:36 GMT
-
Remote address:8.8.8.8:53Requeststun1.l.google.comIN AResponsestun1.l.google.comIN A142.251.125.127
-
Remote address:8.8.8.8:53Request127.125.251.142.in-addr.arpaIN PTRResponse127.125.251.142.in-addr.arpaIN PTRnh-in-f1271e100net
-
Remote address:8.8.8.8:53Request89.16.208.104.in-addr.arpaIN PTRResponse
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=tls, http21.9kB 9.3kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d8c82d84696b4113bd41c50ce4f4a1ab&localId=w:D31CD244-9220-B074-17BF-4F8966053AFB&deviceId=6755455394364654&anid=HTTP Response
204 -
322 B 7
-
1.1kB 4.7kB 12 12
-
1.4kB 6.6kB 14 16
-
143.2kB 5.7MB 3007 4148
-
1.3kB 6.2kB 12 15
-
1.2kB 8.3kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301358_1ZPBGXJ99CUBJXGTN&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2131.4kB 3.7MB 2678 2672
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301289_17HALS3A8X56K0I81&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300925_1WNJI31X17K21EZ5K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300910_1N1UYW7VSBMF6PTRK&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301698_1KQ57XUAVQMPU7APZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301343_1I707L3L7BW4II7PP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301358_1ZPBGXJ99CUBJXGTN&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200 -
1.2kB 8.3kB 16 14
-
1.2kB 8.3kB 16 14
-
1.2kB 8.2kB 16 13
-
2.1kB 6.8kB 11 13
-
71 B 125 B 1 1
DNS Request
126.21.238.8.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
39.142.81.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.208.79.178.in-addr.arpa
-
106 B 179 B 1 1
DNS Request
0347ef30-3d04-47d3-9589-662859d60ed8.uuid.filesdumpplace.org
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
64 B 80 B 1 1
DNS Request
stun3.l.google.com
DNS Response
74.125.24.127
-
64 B 144 B 1 1
DNS Request
cdn.discordapp.com
DNS Response
162.159.135.233162.159.130.233162.159.133.233162.159.129.233162.159.134.233
-
72 B 88 B 1 1
DNS Request
server2.filesdumpplace.org
DNS Response
185.82.216.96
-
96 B 120 B 2 2
-
61 B 93 B 1 1
DNS Request
walkinglate.com
DNS Response
188.114.96.0188.114.97.0
-
72 B 106 B 1 1
DNS Request
127.24.125.74.in-addr.arpa
-
74 B 136 B 1 1
DNS Request
233.135.159.162.in-addr.arpa
-
72 B 135 B 1 1
DNS Request
96.216.82.185.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
0.96.114.188.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
64 B 80 B 1 1
DNS Request
stun1.l.google.com
DNS Response
142.251.125.127
-
48 B 60 B 1 1
-
74 B 108 B 1 1
DNS Request
127.125.251.142.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
89.16.208.104.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54d855c1625b9c82b36510526ff89898a
SHA1e0d763c6cf2bbc4c768a472b70e01519ba92cf75
SHA256d71d9c4983cdbb2259ddc50462b61c069e7e54ea3aca5223ad4026e5245b4771
SHA512854aa072c372ac0372082f769501f4914d7a9cccda16248badf01239ba05682a720409c56a68d9aed6058729d1ee34a80f3f66478a56c75297620f0e1df65103
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52a9b6674e2eb652f3b79369879ba8506
SHA15ca5335c970fda3fc7f6570105c6cbf0253d6533
SHA25623eb0fcdb9829501c4fd7fb0cea005a95e7858010db4fc758d9a1121fc51a2ef
SHA5125d6d10c89159b24c8ff9a7a8ea188069249e9d62e3434d269ab773ae5594547b570af03f7bf1b25201bdc9ab0e244ccf4b60f939fdb0c2c5c0d47b7012b4a75b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d31affbe1c5447d83a945f2434da7a4c
SHA11f86d22701a92ec5588c32d17755cbb2aa94b710
SHA2562d343a9921a4ac55429278f9957f9e8b2b5d3465dca8ca6bd0d1ae78cbdecee6
SHA512c510562d11227c52f34227eb369bea795ed695e03f02153d4abc39e778751853b1b9dabffad3acab1547dd785c30bfe55249d2ebe45b0d16040523bb3341ca57
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574ffe924733a5b9c438cee54af59f4af
SHA1124be82144edb476f218a03934cb92275354550f
SHA25616d3311624ef46ed9fd8feb48f11276a94215c2b8cdc7ccbf2cf7b63c832a379
SHA512409f7f89263e509cc6d5b539decf4d80f62136b2adbed3599c81883c9afe5c77dc00fbd7761caf8e53019ef3d164d65b05d972d97ea7fe3a708f45cf106e912b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD587456e43d0480fa957e1cc17b68621f2
SHA145973721e5b206bfbc8942ec78c0fcb1f8eeb3c6
SHA256fc6f03e8933fbd8e394535981e9d9a45439a45997846e97704aad2a2e4b1ce17
SHA512bc7e4fc9bf1f5c84eac8a19a0c752fcec9407506173a744b06631a03b57347a7ef7990f3fa3e2147351704bfba870071f78e4c85c06a90e5d17a544a6caa0407
-
Filesize
4.1MB
MD58c90a17cefedced2b98630afa28f7920
SHA1b8292b3dc605ce173b3cfc0d9de0944b8b278ab9
SHA256ffbcf05dc1a30b52874ef86c4dfccaf4574655c207af6ed93c8ed4edae653aee
SHA512c5295e8c0929e9a9d908cc105908a4f7318a786162eaf5cf71644379023e8c110f2db0e0d55d1fa76e35d1c33d6f43992595ad6732c943187824361ce6c03741
-
Filesize
4.1MB
MD58c90a17cefedced2b98630afa28f7920
SHA1b8292b3dc605ce173b3cfc0d9de0944b8b278ab9
SHA256ffbcf05dc1a30b52874ef86c4dfccaf4574655c207af6ed93c8ed4edae653aee
SHA512c5295e8c0929e9a9d908cc105908a4f7318a786162eaf5cf71644379023e8c110f2db0e0d55d1fa76e35d1c33d6f43992595ad6732c943187824361ce6c03741
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec