Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    170s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 17:05 UTC

General

  • Target

    file.exe

  • Size

    5.6MB

  • MD5

    40253a5c2afc1bddfe2a9cb958b51a04

  • SHA1

    9fb0a04691588e6c6dd300b76bb21f635baadaad

  • SHA256

    345e2079dbfff1b00d5f13dc881b21383ab1d15e36739ac951df51dc0fa4f835

  • SHA512

    f2a5e867578de904e1fd5e1f52230ea4b812bbc5deff0ef9a036150809aa9d271b679f67d54ee240d98cc974884e5854cc66cd8e1013c24dcf0d701509d38b2b

  • SSDEEP

    98304:xTeyCFQywfwd3PquhdAl5a8Sgyr3XtM9jrU9ruoZ8D92JaXUz8+GCRbBxWQw:xqy+x5P5dK5HSgQX+9jrU1uoCB2JwSRI

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 10 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3196
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:2420
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2308
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:1836
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:1220
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:4812
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:4348
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3880
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3752
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:8
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#icrgqru#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3140
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:3608
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1376
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4792
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:1004
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:4532
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:2308
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:1836
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:5032
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
              PID:2516
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
                PID:3388
              • C:\Windows\System32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                  PID:4740
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                    PID:3440
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#icrgqru#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4988
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe
                  2⤵
                    PID:872
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3548
                • C:\Program Files\Google\Chrome\updater.exe
                  "C:\Program Files\Google\Chrome\updater.exe"
                  1⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2884

                Network

                • flag-us
                  DNS
                  17.160.190.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  17.160.190.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  9.228.82.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  9.228.82.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  59.128.231.4.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  59.128.231.4.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  126.21.238.8.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  126.21.238.8.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  73.31.126.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  73.31.126.40.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  43.58.199.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  43.58.199.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  198.1.85.104.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  198.1.85.104.in-addr.arpa
                  IN PTR
                  Response
                  198.1.85.104.in-addr.arpa
                  IN PTR
                  a104-85-1-198deploystaticakamaitechnologiescom
                • flag-us
                  DNS
                  20.160.190.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  20.160.190.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  157.123.68.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  157.123.68.40.in-addr.arpa
                  IN PTR
                • flag-us
                  DNS
                  157.123.68.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  157.123.68.40.in-addr.arpa
                  IN PTR
                • flag-us
                  DNS
                  157.123.68.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  157.123.68.40.in-addr.arpa
                  IN PTR
                • flag-us
                  DNS
                  157.123.68.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  157.123.68.40.in-addr.arpa
                  IN PTR
                • flag-us
                  DNS
                  157.123.68.40.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  157.123.68.40.in-addr.arpa
                  IN PTR
                • flag-us
                  DNS
                  146.78.124.51.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  146.78.124.51.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  56.126.166.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  56.126.166.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  126.177.238.8.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  126.177.238.8.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  26.35.223.20.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  26.35.223.20.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  tse1.mm.bing.net
                  Remote address:
                  8.8.8.8:53
                  Request
                  tse1.mm.bing.net
                  IN A
                  Response
                  tse1.mm.bing.net
                  IN CNAME
                  mm-mm.bing.net.trafficmanager.net
                  mm-mm.bing.net.trafficmanager.net
                  IN CNAME
                  dual-a-0001.a-msedge.net
                  dual-a-0001.a-msedge.net
                  IN A
                  204.79.197.200
                  dual-a-0001.a-msedge.net
                  IN A
                  13.107.21.200
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 362493
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 14E51EFAD8814746A34DDBEFE5CFE170 Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:49Z
                  date: Tue, 07 Nov 2023 17:06:48 GMT
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 345334
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 0AFE469A43DA4C27AA9EB2329C8F9D63 Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:49Z
                  date: Tue, 07 Nov 2023 17:06:48 GMT
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301141_1T14XQS0S9BBP3SVW&pid=21.2&w=1920&h=1080&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317301141_1T14XQS0S9BBP3SVW&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 184690
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 8D70CF38BD25448BBE3E1B8215A06F7A Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:49Z
                  date: Tue, 07 Nov 2023 17:06:48 GMT
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301550_1KTS2U40XABEYSP4S&pid=21.2&w=1080&h=1920&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317301550_1KTS2U40XABEYSP4S&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 164057
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 460D1EE9EDA34CCE9CF4B0DD0708D69A Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:49Z
                  date: Tue, 07 Nov 2023 17:06:48 GMT
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301096_19QEA75LL3ZH4HJ9P&pid=21.2&w=1920&h=1080&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317301096_19QEA75LL3ZH4HJ9P&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 378343
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: FF65314631974CCBB66751C0645750E8 Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:49Z
                  date: Tue, 07 Nov 2023 17:06:48 GMT
                • flag-us
                  GET
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301529_1DMPN0VMBUXDAYN7W&pid=21.2&w=1080&h=1920&c=4
                  Remote address:
                  204.79.197.200:443
                  Request
                  GET /th?id=OADD2.10239317301529_1DMPN0VMBUXDAYN7W&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
                  host: tse1.mm.bing.net
                  accept: */*
                  accept-encoding: gzip, deflate, br
                  user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                  Response
                  HTTP/2.0 200
                  cache-control: public, max-age=2592000
                  content-length: 326717
                  content-type: image/jpeg
                  x-cache: TCP_HIT
                  access-control-allow-origin: *
                  access-control-allow-headers: *
                  access-control-allow-methods: GET, POST, OPTIONS
                  timing-allow-origin: *
                  report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                  nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                  accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                  x-msedge-ref: Ref A: 36858F2EE0EA417BAF61174235D6FA89 Ref B: BRU30EDGE0917 Ref C: 2023-11-07T17:06:54Z
                  date: Tue, 07 Nov 2023 17:06:53 GMT
                • flag-us
                  DNS
                  200.197.79.204.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  200.197.79.204.in-addr.arpa
                  IN PTR
                  Response
                  200.197.79.204.in-addr.arpa
                  IN PTR
                  a-0001a-msedgenet
                • flag-us
                  DNS
                  13.227.111.52.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  13.227.111.52.in-addr.arpa
                  IN PTR
                  Response
                • flag-us
                  DNS
                  xmr-asia1.nanopool.org
                  explorer.exe
                  Remote address:
                  8.8.8.8:53
                  Request
                  xmr-asia1.nanopool.org
                  IN A
                  Response
                  xmr-asia1.nanopool.org
                  IN A
                  103.3.62.64
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.101.198
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.101.197
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.102.73
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.102.71
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.102.74
                  xmr-asia1.nanopool.org
                  IN A
                  172.104.165.191
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.101.232
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.102.72
                  xmr-asia1.nanopool.org
                  IN A
                  139.99.102.70
                • flag-us
                  DNS
                  191.165.104.172.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  191.165.104.172.in-addr.arpa
                  IN PTR
                  Response
                  191.165.104.172.in-addr.arpa
                  IN PTR
                  li1756-191memberslinodecom
                • flag-us
                  DNS
                  63.141.182.52.in-addr.arpa
                  Remote address:
                  8.8.8.8:53
                  Request
                  63.141.182.52.in-addr.arpa
                  IN PTR
                  Response
                • 204.79.197.200:443
                  https://tse1.mm.bing.net/th?id=OADD2.10239317301529_1DMPN0VMBUXDAYN7W&pid=21.2&w=1080&h=1920&c=4
                  tls, http2
                  68.7kB
                  1.8MB
                  1343
                  1341

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4

                  HTTP Response

                  200

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317301141_1T14XQS0S9BBP3SVW&pid=21.2&w=1920&h=1080&c=4

                  HTTP Response

                  200

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317301550_1KTS2U40XABEYSP4S&pid=21.2&w=1080&h=1920&c=4

                  HTTP Response

                  200

                  HTTP Response

                  200

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317301096_19QEA75LL3ZH4HJ9P&pid=21.2&w=1920&h=1080&c=4

                  HTTP Response

                  200

                  HTTP Request

                  GET https://tse1.mm.bing.net/th?id=OADD2.10239317301529_1DMPN0VMBUXDAYN7W&pid=21.2&w=1080&h=1920&c=4

                  HTTP Response

                  200
                • 204.79.197.200:443
                  tse1.mm.bing.net
                  tls, http2
                  1.2kB
                  8.3kB
                  16
                  14
                • 204.79.197.200:443
                  tse1.mm.bing.net
                  tls, http2
                  1.2kB
                  8.3kB
                  16
                  14
                • 204.79.197.200:443
                  tse1.mm.bing.net
                  tls, http2
                  1.2kB
                  8.3kB
                  16
                  14
                • 172.104.165.191:10343
                  xmr-asia1.nanopool.org
                  tls
                  explorer.exe
                  1.7kB
                  6.7kB
                  16
                  15
                • 8.8.8.8:53
                  17.160.190.20.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  17.160.190.20.in-addr.arpa

                • 8.8.8.8:53
                  9.228.82.20.in-addr.arpa
                  dns
                  70 B
                  156 B
                  1
                  1

                  DNS Request

                  9.228.82.20.in-addr.arpa

                • 8.8.8.8:53
                  59.128.231.4.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  59.128.231.4.in-addr.arpa

                • 8.8.8.8:53
                  126.21.238.8.in-addr.arpa
                  dns
                  71 B
                  125 B
                  1
                  1

                  DNS Request

                  126.21.238.8.in-addr.arpa

                • 8.8.8.8:53
                  73.31.126.40.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  73.31.126.40.in-addr.arpa

                • 8.8.8.8:53
                  43.58.199.20.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  43.58.199.20.in-addr.arpa

                • 8.8.8.8:53
                  198.1.85.104.in-addr.arpa
                  dns
                  71 B
                  135 B
                  1
                  1

                  DNS Request

                  198.1.85.104.in-addr.arpa

                • 8.8.8.8:53
                  20.160.190.20.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  20.160.190.20.in-addr.arpa

                • 8.8.8.8:53
                  157.123.68.40.in-addr.arpa
                  dns
                  360 B
                  5

                  DNS Request

                  157.123.68.40.in-addr.arpa

                  DNS Request

                  157.123.68.40.in-addr.arpa

                  DNS Request

                  157.123.68.40.in-addr.arpa

                  DNS Request

                  157.123.68.40.in-addr.arpa

                  DNS Request

                  157.123.68.40.in-addr.arpa

                • 8.8.8.8:53
                  146.78.124.51.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  146.78.124.51.in-addr.arpa

                • 8.8.8.8:53
                  56.126.166.20.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  56.126.166.20.in-addr.arpa

                • 8.8.8.8:53
                  126.177.238.8.in-addr.arpa
                  dns
                  72 B
                  126 B
                  1
                  1

                  DNS Request

                  126.177.238.8.in-addr.arpa

                • 8.8.8.8:53
                  26.35.223.20.in-addr.arpa
                  dns
                  71 B
                  157 B
                  1
                  1

                  DNS Request

                  26.35.223.20.in-addr.arpa

                • 8.8.8.8:53
                  tse1.mm.bing.net
                  dns
                  62 B
                  173 B
                  1
                  1

                  DNS Request

                  tse1.mm.bing.net

                  DNS Response

                  204.79.197.200
                  13.107.21.200

                • 8.8.8.8:53
                  200.197.79.204.in-addr.arpa
                  dns
                  73 B
                  106 B
                  1
                  1

                  DNS Request

                  200.197.79.204.in-addr.arpa

                • 8.8.8.8:53
                  13.227.111.52.in-addr.arpa
                  dns
                  72 B
                  158 B
                  1
                  1

                  DNS Request

                  13.227.111.52.in-addr.arpa

                • 8.8.8.8:53
                  xmr-asia1.nanopool.org
                  dns
                  explorer.exe
                  68 B
                  228 B
                  1
                  1

                  DNS Request

                  xmr-asia1.nanopool.org

                  DNS Response

                  103.3.62.64
                  139.99.101.198
                  139.99.101.197
                  139.99.102.73
                  139.99.102.71
                  139.99.102.74
                  172.104.165.191
                  139.99.101.232
                  139.99.102.72
                  139.99.102.70

                • 8.8.8.8:53
                  191.165.104.172.in-addr.arpa
                  dns
                  74 B
                  117 B
                  1
                  1

                  DNS Request

                  191.165.104.172.in-addr.arpa

                • 8.8.8.8:53
                  63.141.182.52.in-addr.arpa
                  dns
                  72 B
                  146 B
                  1
                  1

                  DNS Request

                  63.141.182.52.in-addr.arpa

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  5.6MB

                  MD5

                  40253a5c2afc1bddfe2a9cb958b51a04

                  SHA1

                  9fb0a04691588e6c6dd300b76bb21f635baadaad

                  SHA256

                  345e2079dbfff1b00d5f13dc881b21383ab1d15e36739ac951df51dc0fa4f835

                  SHA512

                  f2a5e867578de904e1fd5e1f52230ea4b812bbc5deff0ef9a036150809aa9d271b679f67d54ee240d98cc974884e5854cc66cd8e1013c24dcf0d701509d38b2b

                • C:\Program Files\Google\Chrome\updater.exe

                  Filesize

                  5.6MB

                  MD5

                  40253a5c2afc1bddfe2a9cb958b51a04

                  SHA1

                  9fb0a04691588e6c6dd300b76bb21f635baadaad

                  SHA256

                  345e2079dbfff1b00d5f13dc881b21383ab1d15e36739ac951df51dc0fa4f835

                  SHA512

                  f2a5e867578de904e1fd5e1f52230ea4b812bbc5deff0ef9a036150809aa9d271b679f67d54ee240d98cc974884e5854cc66cd8e1013c24dcf0d701509d38b2b

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  944B

                  MD5

                  62623d22bd9e037191765d5083ce16a3

                  SHA1

                  4a07da6872672f715a4780513d95ed8ddeefd259

                  SHA256

                  95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                  SHA512

                  9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hdfvbrp0.xb2.psm1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  4KB

                  MD5

                  bdb25c22d14ec917e30faf353826c5de

                  SHA1

                  6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                  SHA256

                  e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                  SHA512

                  b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  1KB

                  MD5

                  b42c70c1dbf0d1d477ec86902db9e986

                  SHA1

                  1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                  SHA256

                  8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                  SHA512

                  57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                • memory/872-119-0x00007FF669400000-0x00007FF66942A000-memory.dmp

                  Filesize

                  168KB

                • memory/872-115-0x00007FF669400000-0x00007FF66942A000-memory.dmp

                  Filesize

                  168KB

                • memory/1376-69-0x000001FA50D50000-0x000001FA50D5A000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-66-0x000001FA50C00000-0x000001FA50C0A000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-74-0x000001FA37900000-0x000001FA37910000-memory.dmp

                  Filesize

                  64KB

                • memory/1376-65-0x000001FA50B40000-0x000001FA50BF5000-memory.dmp

                  Filesize

                  724KB

                • memory/1376-73-0x000001FA50DA0000-0x000001FA50DAA000-memory.dmp

                  Filesize

                  40KB

                • memory/1376-72-0x000001FA50D90000-0x000001FA50D96000-memory.dmp

                  Filesize

                  24KB

                • memory/1376-71-0x000001FA50D60000-0x000001FA50D68000-memory.dmp

                  Filesize

                  32KB

                • memory/1376-64-0x000001FA50B20000-0x000001FA50B3C000-memory.dmp

                  Filesize

                  112KB

                • memory/1376-70-0x000001FA50DB0000-0x000001FA50DCA000-memory.dmp

                  Filesize

                  104KB

                • memory/1376-77-0x00007FFAA30C0000-0x00007FFAA3B81000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1376-54-0x00007FF492270000-0x00007FF492280000-memory.dmp

                  Filesize

                  64KB

                • memory/1376-53-0x000001FA37900000-0x000001FA37910000-memory.dmp

                  Filesize

                  64KB

                • memory/1376-67-0x000001FA50D70000-0x000001FA50D8C000-memory.dmp

                  Filesize

                  112KB

                • memory/1376-52-0x00007FFAA30C0000-0x00007FFAA3B81000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2420-0-0x00007FF77FB40000-0x00007FF7800DC000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2420-40-0x00007FF77FB40000-0x00007FF7800DC000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2420-35-0x00007FF77FB40000-0x00007FF7800DC000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2420-16-0x00007FF77FB40000-0x00007FF7800DC000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2884-112-0x00007FF7F5EF0000-0x00007FF7F648C000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2884-42-0x00007FF7F5EF0000-0x00007FF7F648C000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2884-68-0x00007FF7F5EF0000-0x00007FF7F648C000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3140-38-0x00007FFAA3440000-0x00007FFAA3F01000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3140-36-0x000001C06AAA0000-0x000001C06AAB0000-memory.dmp

                  Filesize

                  64KB

                • memory/3140-34-0x00007FFAA3440000-0x00007FFAA3F01000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3140-33-0x000001C06AAA0000-0x000001C06AAB0000-memory.dmp

                  Filesize

                  64KB

                • memory/3140-32-0x000001C06AAA0000-0x000001C06AAB0000-memory.dmp

                  Filesize

                  64KB

                • memory/3140-21-0x000001C06AAA0000-0x000001C06AAB0000-memory.dmp

                  Filesize

                  64KB

                • memory/3140-20-0x000001C06AAA0000-0x000001C06AAB0000-memory.dmp

                  Filesize

                  64KB

                • memory/3140-19-0x00007FFAA3440000-0x00007FFAA3F01000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3548-134-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-132-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-130-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-128-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-126-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-124-0x0000000000D50000-0x0000000000D70000-memory.dmp

                  Filesize

                  128KB

                • memory/3548-123-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-121-0x0000000000D50000-0x0000000000D70000-memory.dmp

                  Filesize

                  128KB

                • memory/3548-120-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-114-0x0000000001380000-0x00000000013C0000-memory.dmp

                  Filesize

                  256KB

                • memory/3548-118-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-116-0x00007FF6B32C0000-0x00007FF6B3AAF000-memory.dmp

                  Filesize

                  7.9MB

                • memory/3548-113-0x0000000000CE0000-0x0000000000D00000-memory.dmp

                  Filesize

                  128KB

                • memory/4528-10-0x00000253AA970000-0x00000253AA992000-memory.dmp

                  Filesize

                  136KB

                • memory/4528-17-0x00007FFAA3320000-0x00007FFAA3DE1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4528-11-0x00007FFAA3320000-0x00007FFAA3DE1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4528-13-0x00000253AA9A0000-0x00000253AA9B0000-memory.dmp

                  Filesize

                  64KB

                • memory/4528-12-0x00000253AA9A0000-0x00000253AA9B0000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-107-0x00007FFAA3440000-0x00007FFAA3F01000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4988-104-0x000001F8A2680000-0x000001F8A2690000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-102-0x00007FF4F6380000-0x00007FF4F6390000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-103-0x000001F8A3360000-0x000001F8A3415000-memory.dmp

                  Filesize

                  724KB

                • memory/4988-92-0x000001F8A2680000-0x000001F8A2690000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-105-0x000001F8A2680000-0x000001F8A2690000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-81-0x000001F8A2680000-0x000001F8A2690000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-80-0x000001F8A2680000-0x000001F8A2690000-memory.dmp

                  Filesize

                  64KB

                • memory/4988-79-0x00007FFAA3440000-0x00007FFAA3F01000-memory.dmp

                  Filesize

                  10.8MB

                We care about your privacy.

                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.