Analysis
-
max time kernel
135s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:39 UTC
Behavioral task
behavioral1
Sample
0e26b78b82d3242f897bf0bf79b7d97b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e26b78b82d3242f897bf0bf79b7d97b.exe
Resource
win10v2004-20231215-en
General
-
Target
0e26b78b82d3242f897bf0bf79b7d97b.exe
-
Size
108KB
-
MD5
0e26b78b82d3242f897bf0bf79b7d97b
-
SHA1
5596ae05c4e3324f350d517f850824dd02c3ee09
-
SHA256
b797da06023ce45d205951c01118c58b96eddb6d43ea6db3b0a197c7b024fe51
-
SHA512
fff0a6793014d3f2fb4560f76806ece4e97b78b553e6e1d58e89dee7a8425304d891b573b6b0be6a02a098aca992ed68da425e4f54da802e2dd26e6b5859e544
-
SSDEEP
3072:Nz4Ug5p9LspgQck04JjrOfhPbNOje3YFtoEG:aUgOZJj+bNOjiYFto
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000231fa-5.dat aspack_v212_v242 behavioral2/files/0x0007000000023203-27.dat aspack_v212_v242 behavioral2/files/0x0007000000023230-177.dat aspack_v212_v242 behavioral2/files/0x0007000000023230-178.dat aspack_v212_v242 behavioral2/files/0x0007000000023231-184.dat aspack_v212_v242 behavioral2/files/0x0007000000023231-183.dat aspack_v212_v242 -
Executes dropped EXE 20 IoCs
pid Process 4376 sqasgmwlk.exe 1872 dmblogwqx.exe 2392 slcppfrzc.exe 4256 dgdzwzswp.exe 388 pijpidefd.exe 736 aazvuuyiw.exe 4556 uirhcnckq.exe 2116 xbvofkuad.exe 5000 pgyulrgvw.exe 1012 zrzixozpm.exe 4600 rfzstxeii.exe 4292 hdvhwlfbh.exe 1136 trvxttigh.exe 1228 rtcezsrhd.exe 1840 hjiihbhjl.exe 3432 ogeaprbrv.exe 1468 lewdhstgz.exe 5028 eftrjaplx.exe 3252 wufgwhdei.exe 2240 yfrftrflb.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File created C:\Windows\SysWOW64\aazvuuyiw.exe pijpidefd.exe File created C:\Windows\SysWOW64\zrzixozpm.exe pgyulrgvw.exe File created C:\Windows\SysWOW64\wufgwhdei.exe eftrjaplx.exe File created C:\Windows\SysWOW64\slcppfrzc.exe dmblogwqx.exe File opened for modification C:\Windows\SysWOW64\dgdzwzswp.exe slcppfrzc.exe File opened for modification C:\Windows\SysWOW64\pijpidefd.exe dgdzwzswp.exe File created C:\Windows\SysWOW64\sqasgmwlk.exe 0e26b78b82d3242f897bf0bf79b7d97b.exe File opened for modification C:\Windows\SysWOW64\sqasgmwlk.exe 0e26b78b82d3242f897bf0bf79b7d97b.exe File opened for modification C:\Windows\SysWOW64\rfzstxeii.exe zrzixozpm.exe File opened for modification C:\Windows\SysWOW64\uirhcnckq.exe aazvuuyiw.exe File opened for modification C:\Windows\SysWOW64\xbvofkuad.exe uirhcnckq.exe File created C:\Windows\SysWOW64\lewdhstgz.exe ogeaprbrv.exe File opened for modification C:\Windows\SysWOW64\slcppfrzc.exe dmblogwqx.exe File created C:\Windows\SysWOW64\dgdzwzswp.exe slcppfrzc.exe File opened for modification C:\Windows\SysWOW64\aazvuuyiw.exe pijpidefd.exe File created C:\Windows\SysWOW64\rfzstxeii.exe zrzixozpm.exe File opened for modification C:\Windows\SysWOW64\ogeaprbrv.exe hjiihbhjl.exe File opened for modification C:\Windows\SysWOW64\lewdhstgz.exe ogeaprbrv.exe File opened for modification C:\Windows\SysWOW64\wufgwhdei.exe eftrjaplx.exe File created C:\Windows\SysWOW64\pijpidefd.exe dgdzwzswp.exe File created C:\Windows\SysWOW64\pgyulrgvw.exe xbvofkuad.exe File opened for modification C:\Windows\SysWOW64\zrzixozpm.exe pgyulrgvw.exe File opened for modification C:\Windows\SysWOW64\hjiihbhjl.exe rtcezsrhd.exe File created C:\Windows\SysWOW64\eftrjaplx.exe lewdhstgz.exe File opened for modification C:\Windows\SysWOW64\eftrjaplx.exe lewdhstgz.exe File created C:\Windows\SysWOW64\xbvofkuad.exe uirhcnckq.exe File opened for modification C:\Windows\SysWOW64\hdvhwlfbh.exe rfzstxeii.exe File created C:\Windows\SysWOW64\trvxttigh.exe hdvhwlfbh.exe File created C:\Windows\SysWOW64\ogeaprbrv.exe hjiihbhjl.exe File opened for modification C:\Windows\SysWOW64\yfrftrflb.exe wufgwhdei.exe File created C:\Windows\SysWOW64\hdvhwlfbh.exe rfzstxeii.exe File opened for modification C:\Windows\SysWOW64\trvxttigh.exe hdvhwlfbh.exe File created C:\Windows\SysWOW64\rtcezsrhd.exe trvxttigh.exe File created C:\Windows\SysWOW64\dmblogwqx.exe sqasgmwlk.exe File opened for modification C:\Windows\SysWOW64\dmblogwqx.exe sqasgmwlk.exe File opened for modification C:\Windows\SysWOW64\pgyulrgvw.exe xbvofkuad.exe File created C:\Windows\SysWOW64\yfrftrflb.exe wufgwhdei.exe File created C:\Windows\SysWOW64\uirhcnckq.exe aazvuuyiw.exe File opened for modification C:\Windows\SysWOW64\rtcezsrhd.exe trvxttigh.exe File created C:\Windows\SysWOW64\hjiihbhjl.exe rtcezsrhd.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1604 wrote to memory of 4376 1604 0e26b78b82d3242f897bf0bf79b7d97b.exe 92 PID 1604 wrote to memory of 4376 1604 0e26b78b82d3242f897bf0bf79b7d97b.exe 92 PID 1604 wrote to memory of 4376 1604 0e26b78b82d3242f897bf0bf79b7d97b.exe 92 PID 4376 wrote to memory of 1872 4376 sqasgmwlk.exe 93 PID 4376 wrote to memory of 1872 4376 sqasgmwlk.exe 93 PID 4376 wrote to memory of 1872 4376 sqasgmwlk.exe 93 PID 1872 wrote to memory of 2392 1872 dmblogwqx.exe 94 PID 1872 wrote to memory of 2392 1872 dmblogwqx.exe 94 PID 1872 wrote to memory of 2392 1872 dmblogwqx.exe 94 PID 2392 wrote to memory of 4256 2392 slcppfrzc.exe 95 PID 2392 wrote to memory of 4256 2392 slcppfrzc.exe 95 PID 2392 wrote to memory of 4256 2392 slcppfrzc.exe 95 PID 4256 wrote to memory of 388 4256 dgdzwzswp.exe 96 PID 4256 wrote to memory of 388 4256 dgdzwzswp.exe 96 PID 4256 wrote to memory of 388 4256 dgdzwzswp.exe 96 PID 388 wrote to memory of 736 388 pijpidefd.exe 97 PID 388 wrote to memory of 736 388 pijpidefd.exe 97 PID 388 wrote to memory of 736 388 pijpidefd.exe 97 PID 736 wrote to memory of 4556 736 aazvuuyiw.exe 98 PID 736 wrote to memory of 4556 736 aazvuuyiw.exe 98 PID 736 wrote to memory of 4556 736 aazvuuyiw.exe 98 PID 4556 wrote to memory of 2116 4556 uirhcnckq.exe 99 PID 4556 wrote to memory of 2116 4556 uirhcnckq.exe 99 PID 4556 wrote to memory of 2116 4556 uirhcnckq.exe 99 PID 2116 wrote to memory of 5000 2116 xbvofkuad.exe 100 PID 2116 wrote to memory of 5000 2116 xbvofkuad.exe 100 PID 2116 wrote to memory of 5000 2116 xbvofkuad.exe 100 PID 5000 wrote to memory of 1012 5000 pgyulrgvw.exe 101 PID 5000 wrote to memory of 1012 5000 pgyulrgvw.exe 101 PID 5000 wrote to memory of 1012 5000 pgyulrgvw.exe 101 PID 1012 wrote to memory of 4600 1012 zrzixozpm.exe 102 PID 1012 wrote to memory of 4600 1012 zrzixozpm.exe 102 PID 1012 wrote to memory of 4600 1012 zrzixozpm.exe 102 PID 4600 wrote to memory of 4292 4600 rfzstxeii.exe 103 PID 4600 wrote to memory of 4292 4600 rfzstxeii.exe 103 PID 4600 wrote to memory of 4292 4600 rfzstxeii.exe 103 PID 4292 wrote to memory of 1136 4292 hdvhwlfbh.exe 105 PID 4292 wrote to memory of 1136 4292 hdvhwlfbh.exe 105 PID 4292 wrote to memory of 1136 4292 hdvhwlfbh.exe 105 PID 1136 wrote to memory of 1228 1136 trvxttigh.exe 108 PID 1136 wrote to memory of 1228 1136 trvxttigh.exe 108 PID 1136 wrote to memory of 1228 1136 trvxttigh.exe 108 PID 1228 wrote to memory of 1840 1228 rtcezsrhd.exe 109 PID 1228 wrote to memory of 1840 1228 rtcezsrhd.exe 109 PID 1228 wrote to memory of 1840 1228 rtcezsrhd.exe 109 PID 1840 wrote to memory of 3432 1840 hjiihbhjl.exe 110 PID 1840 wrote to memory of 3432 1840 hjiihbhjl.exe 110 PID 1840 wrote to memory of 3432 1840 hjiihbhjl.exe 110 PID 3432 wrote to memory of 1468 3432 ogeaprbrv.exe 111 PID 3432 wrote to memory of 1468 3432 ogeaprbrv.exe 111 PID 3432 wrote to memory of 1468 3432 ogeaprbrv.exe 111 PID 1468 wrote to memory of 5028 1468 lewdhstgz.exe 113 PID 1468 wrote to memory of 5028 1468 lewdhstgz.exe 113 PID 1468 wrote to memory of 5028 1468 lewdhstgz.exe 113 PID 5028 wrote to memory of 3252 5028 eftrjaplx.exe 115 PID 5028 wrote to memory of 3252 5028 eftrjaplx.exe 115 PID 5028 wrote to memory of 3252 5028 eftrjaplx.exe 115 PID 3252 wrote to memory of 2240 3252 wufgwhdei.exe 116 PID 3252 wrote to memory of 2240 3252 wufgwhdei.exe 116 PID 3252 wrote to memory of 2240 3252 wufgwhdei.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e26b78b82d3242f897bf0bf79b7d97b.exe"C:\Users\Admin\AppData\Local\Temp\0e26b78b82d3242f897bf0bf79b7d97b.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\sqasgmwlk.exeC:\Windows\system32\sqasgmwlk.exe 1128 "C:\Users\Admin\AppData\Local\Temp\0e26b78b82d3242f897bf0bf79b7d97b.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\dmblogwqx.exeC:\Windows\system32\dmblogwqx.exe 1152 "C:\Windows\SysWOW64\sqasgmwlk.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\slcppfrzc.exeC:\Windows\system32\slcppfrzc.exe 1156 "C:\Windows\SysWOW64\dmblogwqx.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\dgdzwzswp.exeC:\Windows\system32\dgdzwzswp.exe 1164 "C:\Windows\SysWOW64\slcppfrzc.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\pijpidefd.exeC:\Windows\system32\pijpidefd.exe 1160 "C:\Windows\SysWOW64\dgdzwzswp.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\aazvuuyiw.exeC:\Windows\system32\aazvuuyiw.exe 1168 "C:\Windows\SysWOW64\pijpidefd.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\uirhcnckq.exeC:\Windows\system32\uirhcnckq.exe 1176 "C:\Windows\SysWOW64\aazvuuyiw.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\xbvofkuad.exeC:\Windows\system32\xbvofkuad.exe 1172 "C:\Windows\SysWOW64\uirhcnckq.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\pgyulrgvw.exeC:\Windows\system32\pgyulrgvw.exe 1180 "C:\Windows\SysWOW64\xbvofkuad.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\zrzixozpm.exeC:\Windows\system32\zrzixozpm.exe 1184 "C:\Windows\SysWOW64\pgyulrgvw.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\rfzstxeii.exeC:\Windows\system32\rfzstxeii.exe 1188 "C:\Windows\SysWOW64\zrzixozpm.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\hdvhwlfbh.exeC:\Windows\system32\hdvhwlfbh.exe 1192 "C:\Windows\SysWOW64\rfzstxeii.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\trvxttigh.exeC:\Windows\system32\trvxttigh.exe 1200 "C:\Windows\SysWOW64\hdvhwlfbh.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rtcezsrhd.exeC:\Windows\system32\rtcezsrhd.exe 1208 "C:\Windows\SysWOW64\trvxttigh.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\hjiihbhjl.exeC:\Windows\system32\hjiihbhjl.exe 1212 "C:\Windows\SysWOW64\rtcezsrhd.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\ogeaprbrv.exeC:\Windows\system32\ogeaprbrv.exe 1196 "C:\Windows\SysWOW64\hjiihbhjl.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\lewdhstgz.exeC:\Windows\system32\lewdhstgz.exe 1204 "C:\Windows\SysWOW64\ogeaprbrv.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\eftrjaplx.exeC:\Windows\system32\eftrjaplx.exe 1216 "C:\Windows\SysWOW64\lewdhstgz.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\wufgwhdei.exeC:\Windows\system32\wufgwhdei.exe 1224 "C:\Windows\SysWOW64\eftrjaplx.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\yfrftrflb.exeC:\Windows\system32\yfrftrflb.exe 1044 "C:\Windows\SysWOW64\wufgwhdei.exe"21⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\lxjjqlfoz.exeC:\Windows\system32\lxjjqlfoz.exe 1236 "C:\Windows\SysWOW64\yfrftrflb.exe"22⤵PID:3924
-
C:\Windows\SysWOW64\fetwnoixj.exeC:\Windows\system32\fetwnoixj.exe 1028 "C:\Windows\SysWOW64\lxjjqlfoz.exe"23⤵PID:5020
-
C:\Windows\SysWOW64\ydwbshkbd.exeC:\Windows\system32\ydwbshkbd.exe 1052 "C:\Windows\SysWOW64\fetwnoixj.exe"24⤵PID:5036
-
C:\Windows\SysWOW64\ypithlovs.exeC:\Windows\system32\ypithlovs.exe 1244 "C:\Windows\SysWOW64\ydwbshkbd.exe"25⤵PID:3180
-
C:\Windows\SysWOW64\lflwptmcl.exeC:\Windows\system32\lflwptmcl.exe 1248 "C:\Windows\SysWOW64\ypithlovs.exe"26⤵PID:2792
-
C:\Windows\SysWOW64\nmrhfkvyn.exeC:\Windows\system32\nmrhfkvyn.exe 1256 "C:\Windows\SysWOW64\lflwptmcl.exe"27⤵PID:3260
-
C:\Windows\SysWOW64\aqyntnofc.exeC:\Windows\system32\aqyntnofc.exe 1228 "C:\Windows\SysWOW64\nmrhfkvyn.exe"28⤵PID:2920
-
C:\Windows\SysWOW64\cxvehiwci.exeC:\Windows\system32\cxvehiwci.exe 1032 "C:\Windows\SysWOW64\aqyntnofc.exe"29⤵PID:460
-
C:\Windows\SysWOW64\vqkcsmcaj.exeC:\Windows\system32\vqkcsmcaj.exe 1268 "C:\Windows\SysWOW64\cxvehiwci.exe"30⤵PID:3844
-
C:\Windows\SysWOW64\pcrezormr.exeC:\Windows\system32\pcrezormr.exe 1272 "C:\Windows\SysWOW64\vqkcsmcaj.exe"31⤵PID:1636
-
C:\Windows\SysWOW64\wrnncortv.exeC:\Windows\system32\wrnncortv.exe 1276 "C:\Windows\SysWOW64\pcrezormr.exe"32⤵PID:3144
-
C:\Windows\SysWOW64\tmnletmcm.exeC:\Windows\system32\tmnletmcm.exe 1260 "C:\Windows\SysWOW64\wrnncortv.exe"33⤵PID:4420
-
C:\Windows\SysWOW64\jcjwkwurj.exeC:\Windows\system32\jcjwkwurj.exe 1280 "C:\Windows\SysWOW64\tmnletmcm.exe"34⤵PID:3720
-
C:\Windows\SysWOW64\wptmqatex.exeC:\Windows\system32\wptmqatex.exe 1288 "C:\Windows\SysWOW64\jcjwkwurj.exe"35⤵PID:3864
-
C:\Windows\SysWOW64\hofjbzbex.exeC:\Windows\system32\hofjbzbex.exe 1060 "C:\Windows\SysWOW64\wptmqatex.exe"36⤵PID:4840
-
C:\Windows\SysWOW64\adnehcgwx.exeC:\Windows\system32\adnehcgwx.exe 1284 "C:\Windows\SysWOW64\hofjbzbex.exe"37⤵PID:4800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A92.123.241.137
-
Remote address:92.123.241.137:80RequestGET /pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crt HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: www.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: YAUaFgF7vUODUG8XQQW6BQ==
Last-Modified: Fri, 28 Sep 2018 22:50:05 GMT
ETag: 0x8D62594BC0C84D8
x-ms-request-id: 9327f1ba-601e-004f-4648-1536e4000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Sun, 24 Dec 2023 23:41:50 GMT
Connection: keep-alive
TLS_version: UNKNOWN
ms-cv: CASMicrosoftCV52ac588a.0
ms-cv-esi: CASMicrosoftCV52ac588a.0
X-RTag: RT
-
Remote address:8.8.8.8:53Request137.241.123.92.in-addr.arpaIN PTRResponse137.241.123.92.in-addr.arpaIN PTRa92-123-241-137deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request137.241.123.92.in-addr.arpaIN PTR
-
Remote address:92.123.241.137:80RequestGET /pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crt HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: www.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: YAUaFgF7vUODUG8XQQW6BQ==
Last-Modified: Fri, 28 Sep 2018 22:50:05 GMT
ETag: 0x8D62594BC0C84D8
x-ms-request-id: 9327f1ba-601e-004f-4648-1536e4000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Sun, 24 Dec 2023 23:41:53 GMT
Connection: keep-alive
TLS_version: UNKNOWN
ms-cv: CASMicrosoftCV52ac7e84.0
ms-cv-esi: CASMicrosoftCV52ac7e84.0
X-RTag: RT
-
Remote address:8.8.8.8:53Request21.53.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
52 B 1
-
92.123.241.137:80http://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crthttp418 B 1.8kB 5 4
HTTP Request
GET http://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crtHTTP Response
200 -
92.123.241.137:80http://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crthttp470 B 1.8kB 6 4
HTTP Request
GET http://www.microsoft.com/pkiops/certs/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crtHTTP Response
200 -
46.1kB 1.3MB 935 932
-
1.2kB 8.3kB 16 14
-
1.2kB 8.3kB 15 14
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
92.123.241.137
-
146 B 139 B 2 1
DNS Request
137.241.123.92.in-addr.arpa
DNS Request
137.241.123.92.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
21.53.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
57.169.31.20.in-addr.arpa
DNS Request
57.169.31.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ea38d19442ec0030836a051da40aca97
SHA1c8169df4346283762715f90bba97f9e168d08880
SHA256ace12b6b0e8ecfa3b29dff75545b5557dacf3f8c06660ea3009fcbf9adbe81ff
SHA5127ffed2aea982e0c7f9388e2e3ef83e942c05acd736cc1ad5f9a253fdea9142a3d0514f939527cec4348095fcb6056bb0e9e2af76af47bfc28d065ea00f2423a8
-
Filesize
104KB
MD5a7bddb3eb01f0497f7b7c65f800a65de
SHA1489978c88c25a265b7dcc8044e81afa33f6bf101
SHA25611400eeb177c9454eb63ebf9373cfe01a5623624a4b663e0a561f93da3311f11
SHA512a62caf9c629614e298a8212eb586fb0007d11ff2fc62c66008c2b664948aafcb18cf9511b817c12846f4010c1f8910d627e6135079cdd4f026cc8df9915fd88f
-
Filesize
105KB
MD5a28d40f09228328992a0b524daaf011b
SHA1faa8c1db184a5a32d5c7274598870f41700a82cc
SHA25665628ba4fbf8f033399a7882092d6f7a2ca4be738b4b6e7c71974202038d9224
SHA512ce005fbeb3f998c2d290f8a8f094fb67e4d5b9942b64771166614c29553809c006a6f95e4c2fa85a9a4b27b03f8d74996a1183c7eca0a431e139bad6f78c5790
-
Filesize
108KB
MD50e26b78b82d3242f897bf0bf79b7d97b
SHA15596ae05c4e3324f350d517f850824dd02c3ee09
SHA256b797da06023ce45d205951c01118c58b96eddb6d43ea6db3b0a197c7b024fe51
SHA512fff0a6793014d3f2fb4560f76806ece4e97b78b553e6e1d58e89dee7a8425304d891b573b6b0be6a02a098aca992ed68da425e4f54da802e2dd26e6b5859e544
-
Filesize
27KB
MD5c56664cc51aace320820189282c4534c
SHA1acb66120f02db5e33b7d9288d748b9988c95f62d
SHA256fa47ccaaf94f4cf6ecfc7467085dd1ed4a09517c1e0e9a2997bbfb6ab551a928
SHA5127f304956eed20f83e2a69e43561321d5d3294424dda6b0db2936d39d27e0bffb18e3a8291c3db01ea2cf2e5128c62bd5f8a7450440ffd373f1e269e90a0b4dab
-
Filesize
90KB
MD5cb73c2ce2adde7933f66d83a73e4b0ea
SHA10059f6d39507abc0ea18716b70e2036ee696f501
SHA256bad779d1bf39942f93d05819a8af392e223fc5f4b582287a052bd99b2a2251fc
SHA5123b51cafe74567c3ee7432d916c5d6aaff3baf7bb4c20ff2e1abffbe4c4572e19e82585d996094f7f75fbb7677fce9ba5bc341db7988b62fae2772c06e23cbdab