Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2023, 15:53 UTC

General

  • Target

    1c532f2594.msi

  • Size

    8.5MB

  • MD5

    fbf5d7b4c5f0e86a95b4fcd5c5ccc534

  • SHA1

    51588315ff4ae36412c337361ea65f84810938d8

  • SHA256

    6da198925581418863170f05b832cd1584b923278d0730d779a30ec96513111d

  • SHA512

    3ef2d34071fc10bed59dbe60df3789524f62b89284cc011f1ab0a790196f9010ef6fa41d809947f52668918aa72c90c17211d6be82707b0f8099df548fb40588

  • SSDEEP

    196608:0eS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9OtaQCK0Ex7FVJi0:0dhVs6WXjX9HZ5AQX32WDb0ExZV8

Malware Config

Extracted

Family

darkgate

Botnet

PLEX

C2

http://jordanmikejeforse.com

Attributes
  • alternative_c2_port

    8080

  • anti_analysis

    true

  • anti_debug

    true

  • anti_vm

    true

  • c2_port

    8443

  • check_disk

    false

  • check_ram

    true

  • check_xeon

    true

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_rawstub

    true

  • crypto_key

    yIzFYincIffips

  • internal_mutex

    txtMut

  • minimum_disk

    20

  • minimum_ram

    6000

  • ping_interval

    4

  • rootkit

    true

  • startup_persistence

    true

  • username

    PLEX

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1c532f2594.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2752
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3760
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DE883081796D6C340C2B95D866B77B12
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1216
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:3276
      • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\windbg.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\windbg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1708
        • \??\c:\tmpa\Autoit3.exe
          c:\tmpa\Autoit3.exe c:\tmpa\script.au3
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:4740
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        PID:2244
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4024

Network

  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.52.96.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.52.96.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    254.105.26.67.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    254.105.26.67.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    155.245.36.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    155.245.36.23.in-addr.arpa
    IN PTR
    Response
    155.245.36.23.in-addr.arpa
    IN PTR
    a23-36-245-155deploystaticakamaitechnologiescom
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    192.240.110.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    192.240.110.104.in-addr.arpa
    IN PTR
    Response
    192.240.110.104.in-addr.arpa
    IN PTR
    a104-110-240-192deploystaticakamaitechnologiescom
  • flag-us
    DNS
    2.136.104.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.136.104.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    tse1.mm.bing.net
    Remote address:
    8.8.8.8:53
    Request
    tse1.mm.bing.net
    IN A
    Response
    tse1.mm.bing.net
    IN CNAME
    mm-mm.bing.net.trafficmanager.net
    mm-mm.bing.net.trafficmanager.net
    IN CNAME
    dual-a-0001.a-msedge.net
    dual-a-0001.a-msedge.net
    IN A
    204.79.197.200
    dual-a-0001.a-msedge.net
    IN A
    13.107.21.200
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301303_1EAOJAYMFAD8YIR5A&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301303_1EAOJAYMFAD8YIR5A&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 160252
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: ED6483A9C972424E8D578435A2D2487E Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:28Z
    date: Thu, 09 Nov 2023 15:54:27 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301209_1YG8XJG78E6WL3S49&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301209_1YG8XJG78E6WL3S49&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 482655
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: DAFA8B930CEB4933819D2AE1056A2546 Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:28Z
    date: Thu, 09 Nov 2023 15:54:27 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301225_1DZROXCI1NKORI8W4&pid=21.2&w=1920&h=1080&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301225_1DZROXCI1NKORI8W4&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 463110
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 56D8895217B8452BBF0048F6085E23B9 Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:28Z
    date: Thu, 09 Nov 2023 15:54:27 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301712_1VAFFW2XLOWABA0CF&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301712_1VAFFW2XLOWABA0CF&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 141161
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 9105152F1C9A4FE6BDD62C064D0E64AD Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:28Z
    date: Thu, 09 Nov 2023 15:54:28 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301634_10VKNY6NZN82LU9UT&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301634_10VKNY6NZN82LU9UT&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 410629
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 8B4C9504700F4DD1B6FEE1535DC22D40 Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:29Z
    date: Thu, 09 Nov 2023 15:54:28 GMT
  • flag-us
    GET
    https://tse1.mm.bing.net/th?id=OADD2.10239317301618_18EK60OU3ULIWMD9V&pid=21.2&w=1080&h=1920&c=4
    Remote address:
    204.79.197.200:443
    Request
    GET /th?id=OADD2.10239317301618_18EK60OU3ULIWMD9V&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
    host: tse1.mm.bing.net
    accept: */*
    accept-encoding: gzip, deflate, br
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
    Response
    HTTP/2.0 200
    cache-control: public, max-age=2592000
    content-length: 508694
    content-type: image/jpeg
    x-cache: TCP_HIT
    access-control-allow-origin: *
    access-control-allow-headers: *
    access-control-allow-methods: GET, POST, OPTIONS
    timing-allow-origin: *
    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: BC26CBA5EA654D14A8CDFF9DC1034165 Ref B: AMS04EDGE2108 Ref C: 2023-11-09T15:54:30Z
    date: Thu, 09 Nov 2023 15:54:29 GMT
  • flag-us
    DNS
    121.252.72.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    121.252.72.23.in-addr.arpa
    IN PTR
    Response
    121.252.72.23.in-addr.arpa
    IN PTR
    a23-72-252-121deploystaticakamaitechnologiescom
  • flag-us
    DNS
    28.246.36.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.246.36.23.in-addr.arpa
    IN PTR
    Response
    28.246.36.23.in-addr.arpa
    IN PTR
    a23-36-246-28deploystaticakamaitechnologiescom
  • flag-us
    DNS
    178.223.142.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    178.223.142.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    3.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    3.173.189.20.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    8.3kB
    16
    14
  • 204.79.197.200:443
    tse1.mm.bing.net
    tls, http2
    1.2kB
    8.2kB
    16
    13
  • 204.79.197.200:443
    https://tse1.mm.bing.net/th?id=OADD2.10239317301618_18EK60OU3ULIWMD9V&pid=21.2&w=1080&h=1920&c=4
    tls, http2
    82.9kB
    2.2MB
    1645
    1640

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301303_1EAOJAYMFAD8YIR5A&pid=21.2&w=1920&h=1080&c=4

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301209_1YG8XJG78E6WL3S49&pid=21.2&w=1920&h=1080&c=4

    HTTP Response

    200

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301225_1DZROXCI1NKORI8W4&pid=21.2&w=1920&h=1080&c=4

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301712_1VAFFW2XLOWABA0CF&pid=21.2&w=1080&h=1920&c=4

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301634_10VKNY6NZN82LU9UT&pid=21.2&w=1080&h=1920&c=4

    HTTP Response

    200

    HTTP Request

    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301618_18EK60OU3ULIWMD9V&pid=21.2&w=1080&h=1920&c=4

    HTTP Response

    200
  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    198.52.96.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.52.96.20.in-addr.arpa

  • 8.8.8.8:53
    254.105.26.67.in-addr.arpa
    dns
    72 B
    126 B
    1
    1

    DNS Request

    254.105.26.67.in-addr.arpa

  • 8.8.8.8:53
    155.245.36.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    155.245.36.23.in-addr.arpa

  • 8.8.8.8:53
    57.169.31.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    57.169.31.20.in-addr.arpa

  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    192.240.110.104.in-addr.arpa
    dns
    74 B
    141 B
    1
    1

    DNS Request

    192.240.110.104.in-addr.arpa

  • 8.8.8.8:53
    2.136.104.51.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    2.136.104.51.in-addr.arpa

  • 8.8.8.8:53
    tse1.mm.bing.net
    dns
    62 B
    173 B
    1
    1

    DNS Request

    tse1.mm.bing.net

    DNS Response

    204.79.197.200
    13.107.21.200

  • 8.8.8.8:53
    121.252.72.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    121.252.72.23.in-addr.arpa

  • 8.8.8.8:53
    28.246.36.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    28.246.36.23.in-addr.arpa

  • 8.8.8.8:53
    178.223.142.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    178.223.142.52.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    3.173.189.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    3.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files.cab

    Filesize

    8.3MB

    MD5

    d5298413b9d6dc59e277eb08f6e4431c

    SHA1

    55d71275c8737068b130dade96a8354d966e295a

    SHA256

    5d8fea0c2e3a41247dada38ccaf7222aef40fc485e26e54dbee1fbcadb3079c0

    SHA512

    983fee4dd48b55eb572b09eb1d743a61a67d320c23b55f7b9e8a9e55e407b8b3db00ffe5ca4c6793d26b436decb9dac9323003692c8ebac291c70396e6a0e2b6

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\00004-4001132497.png

    Filesize

    1.1MB

    MD5

    2ccc17c1a5bb5e656e7f3bb09ff0beff

    SHA1

    05866cf7dd5fa99ea852b01c2791b30e7741ea19

    SHA256

    411b6ce9e97a4d828ab43dcf896f8ea09b5e9dc02874909f53ca1e0f10caeed2

    SHA512

    46b7362a2df870018707d89a7340ac0c07a2a357c504dbd944699c0231b4f984661b9f112b9d4869e55cf208ed5968f3ec5b5b35a956329679fb6e48ada7c4c5

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\00005-3546315028.png

    Filesize

    1.8MB

    MD5

    dee56d4f89c71ea6c4f1e75b82f2e9c9

    SHA1

    293ce531cddbf4034782d5dfed1e35c807d75c52

    SHA256

    a8f1ffb62d49d35a0f838f358614333e3d5d68ce5409fdfefcd1aa218d4639cf

    SHA512

    e8c38dc1d7a49d9cb919eae5294cc64379a933cdbd5427ed38c5f915271655f9bd6363e131f9d8a74ffdda23c7b155cc5200ddf999339ea611b98e74355faa0c

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\00006-3546315029.png

    Filesize

    1.8MB

    MD5

    173a98c6c7a166db7c3caa3a06fec06c

    SHA1

    3c562051f42353e72ba87b6f54744f6d0107df86

    SHA256

    212a80b3f8e68d00dbd8fc55fc8c4b30ee996348262d5d37e8b3f431a4b2fdad

    SHA512

    9dcd341937eff32762767d3538499d211f5a50fddb4e83d5d1afbeb87a5420c1fb9952ef2ecc744c460b7d53baa2bffbe99087a9f794d25ba78d1af61ea8b54d

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\00007-3546315030.png

    Filesize

    1.6MB

    MD5

    94b4895b7b8a60481393b7b8c22ad742

    SHA1

    902796c4aee78ab74e7ba5004625d797d83a8787

    SHA256

    f449409c8747d8e73ac7f8539c6e26d526ef51d267fed40eadce138389db5973

    SHA512

    d1ed6f5a1920eca041a683d71ac562058bc513877e3ae8be18888797d0713e25964c610428f9474d9b539097441002275e1f0023a565bd205cd4153ac282b61e

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\data.bin

    Filesize

    92KB

    MD5

    472526a8c742a25296b345509638c863

    SHA1

    345523ddcd3216cf060ce242071374614fc372a6

    SHA256

    5d7aace8eb61d1fb4553069d8501100d64abb9968b1f20f84f3d23c71dab1366

    SHA512

    8ab00a37557e6e92476a85ae8e5f71fa1a84e54a0e60e5f75eb553d12e145b17fd4b82b81cf2610435976c828f29865df41c4cddc2224e55dfa0edf7375f67f1

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\data2.bin

    Filesize

    1.8MB

    MD5

    5be4a940ee8e35bafe74fb4b80c81ef1

    SHA1

    aaef9c2779ce4a43859248a181b30f70bb947a50

    SHA256

    61e7a91c74b852f0eec7587bed6080d2950769b7b7587927d8dcfafe03e9d670

    SHA512

    d6d6dd61af6f3a0ee3db240b6b341fd310716c3f5fe78ee79a8cfc39349ad5ab8ec3823d15acc8cf56e03d78e30734beae9cd151bced6e42b3123b0f00e73930

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\dbgeng.dll

    Filesize

    1.9MB

    MD5

    a5fcc0097a7eca9ed79596243aac4652

    SHA1

    865f03e10c56d2d1c30f500597a6d0dbd1030f68

    SHA256

    8e8ea3571042dffcd35491bfd1530a7e4c10ee04efd3ab181bdde37ef1e07e0d

    SHA512

    1644a70d039aa9b221e5d65a2879ffabd1cfd0798d6be31ba16938225286a465281ae768d396203668ee6aec417216018a1ad833124d63e1ddbbd667ab097505

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\dbgeng.dll

    Filesize

    1.9MB

    MD5

    a5fcc0097a7eca9ed79596243aac4652

    SHA1

    865f03e10c56d2d1c30f500597a6d0dbd1030f68

    SHA256

    8e8ea3571042dffcd35491bfd1530a7e4c10ee04efd3ab181bdde37ef1e07e0d

    SHA512

    1644a70d039aa9b221e5d65a2879ffabd1cfd0798d6be31ba16938225286a465281ae768d396203668ee6aec417216018a1ad833124d63e1ddbbd667ab097505

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\windbg.exe

    Filesize

    474KB

    MD5

    04ec4f58a1f4a87b5eeb1f4b7afc48e0

    SHA1

    58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

    SHA256

    bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

    SHA512

    5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\files\windbg.exe

    Filesize

    474KB

    MD5

    04ec4f58a1f4a87b5eeb1f4b7afc48e0

    SHA1

    58dcb1cbbec071d036a07f0e8feb858e4c5b96e7

    SHA256

    bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4

    SHA512

    5b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\msiwrapper.ini

    Filesize

    1KB

    MD5

    70d6b36270b2fb793fa1fdf9e55a3503

    SHA1

    bd55f4b4c5616f26a65dddb038f1866785fc8f9d

    SHA256

    98f8f346b7c71b64c284be6c04c8b4e371aca610fa7df7e6c376510efc9f83e0

    SHA512

    ae9147993bd485d752367fa7e0bf7a324ca71ef7a165e23bb2fcc699671ed9771f919f46386507d93b6fd7f87c8259d4dbd11a0c5f4d133f317835dbdbb64c55

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\msiwrapper.ini

    Filesize

    1010B

    MD5

    705ca215c6cbeffd65a36ead61be5d0c

    SHA1

    e43066c6be9c6b9c6659cd5afc32584f83304959

    SHA256

    79bbdcf76404e9dc1af529f108b8d95843f4258be32bef6a339a5760394a8099

    SHA512

    bff2259003b280f0fd0057651056ec104d102755c31bde7b965b2881aa174f89fddafecba2388bc8895fe86d1fec9194db1dbadc043159333f43a636bbc6620f

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\msiwrapper.ini

    Filesize

    1KB

    MD5

    72854c64aeda272221f96da73a6c4d1b

    SHA1

    eec8fb8f6db97cb742398817fcbc72c5e55074d6

    SHA256

    7faf7fbeb28e1a270b5eac21818cc585f41fa371ba6a533246876e89a3a7b6b8

    SHA512

    33e26ece957b713972d075a039c7d08e0704d13828a1e433a75bdbe3e6522191dea9709306f7f6c93a4191df0be1b7812b36914d78465c7065282c2c97857894

  • C:\Users\Admin\AppData\Local\Temp\MW-eed24818-541a-4e9a-94e0-9b32c60d3ef4\msiwrapper.ini

    Filesize

    1KB

    MD5

    72854c64aeda272221f96da73a6c4d1b

    SHA1

    eec8fb8f6db97cb742398817fcbc72c5e55074d6

    SHA256

    7faf7fbeb28e1a270b5eac21818cc585f41fa371ba6a533246876e89a3a7b6b8

    SHA512

    33e26ece957b713972d075a039c7d08e0704d13828a1e433a75bdbe3e6522191dea9709306f7f6c93a4191df0be1b7812b36914d78465c7065282c2c97857894

  • C:\Windows\Installer\MSI3F70.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI3F70.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI5C9F.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\Windows\Installer\MSI5C9F.tmp

    Filesize

    208KB

    MD5

    d82b3fb861129c5d71f0cd2874f97216

    SHA1

    f3fe341d79224126e950d2691d574d147102b18d

    SHA256

    107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

    SHA512

    244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

  • C:\tmpa\Autoit3.exe

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.0MB

    MD5

    88a316da78be5aeedaf9f07a93cd2919

    SHA1

    951c6478cd98f0267118fb6f92ebdac874abd46f

    SHA256

    ec98110ab457f69379f4be86998165272e931c042533fdf5d2247fbd28adade2

    SHA512

    04f68d783ee51454c4226e597aed9500ebc1a1f7789b965a7ac8b8c544604cda13bc4bdf4af01d2855b32e8e864b012f0c747e2b91fd46021c8468d830e86a02

  • \??\Volume{c2d04a06-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{42eebeb9-6a24-49d3-af50-07065c80898a}_OnDiskSnapshotProp

    Filesize

    5KB

    MD5

    07ad27f3f49345e6edb221f7a8951a4c

    SHA1

    986f34d6b1f192da1bed7f4b3bd6a842d41bcc56

    SHA256

    44fdb637ca007ef9b8aed95d81a6736833a455b91b92eee1c5f5685e1efc5b5a

    SHA512

    d1a2e34dddbbb1bb1d9823d2c13f1c1be6aac054389f0456278faf995b471fb2c64e6781d4ac5eaf4e5d9baf04054fa47efd9ab43b98eee6528c07a6d875edcc

  • \??\c:\tmpa\script.au3

    Filesize

    536KB

    MD5

    53041e3e4bae56f12d3b1b8e395f0055

    SHA1

    ff1ccc146e62dd9f4a0f233d9a37854b1190f6c0

    SHA256

    65f996a60954e9c328624ff8f76ed150cc9facfde950e223bc4f8e1554a40b3f

    SHA512

    5560e86341cb2c07a5cc4aca14c07b463e3d6b18691a07ebfc85ff8079b5adb12b68c659278f7e402921f8990f00ef7c5946a0a30b7d41abb55b2ea68f87a7e5

  • memory/1708-103-0x00000000030A0000-0x000000000312A000-memory.dmp

    Filesize

    552KB

  • memory/1708-102-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1708-97-0x00000000030A0000-0x000000000312A000-memory.dmp

    Filesize

    552KB

  • memory/4740-112-0x0000000003F60000-0x00000000040F5000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-111-0x0000000003910000-0x0000000003A10000-memory.dmp

    Filesize

    1024KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.