Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:13 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0162043ff06fc0b7df59995580637c08.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0162043ff06fc0b7df59995580637c08.exe
Resource
win10v2004-20231215-en
General
-
Target
0162043ff06fc0b7df59995580637c08.exe
-
Size
10.1MB
-
MD5
0162043ff06fc0b7df59995580637c08
-
SHA1
dbc586ca0e60b45b96824f4daa8d0ec4d3d41bdd
-
SHA256
68144fe9a725e15493eb9156fc66f401701aff5daec246cb7489eca9993fa751
-
SHA512
76bdd28851dd82ff301f77e98a1cd03cc6950dfdd04396293fb4d1181c74febdead5574b2a5d20148908a9a13850be83b279c1a5248be633bf30b62aa953c121
-
SSDEEP
196608:YV8YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY4:
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4416 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\nszekpmk\ImagePath = "C:\\Windows\\SysWOW64\\nszekpmk\\xrtwpoo.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 0162043ff06fc0b7df59995580637c08.exe -
Deletes itself 1 IoCs
pid Process 2688 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4540 xrtwpoo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4540 set thread context of 2688 4540 xrtwpoo.exe 105 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3620 sc.exe 1916 sc.exe 3884 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 748 2164 WerFault.exe 86 2612 4540 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2164 wrote to memory of 4868 2164 0162043ff06fc0b7df59995580637c08.exe 90 PID 2164 wrote to memory of 4868 2164 0162043ff06fc0b7df59995580637c08.exe 90 PID 2164 wrote to memory of 4868 2164 0162043ff06fc0b7df59995580637c08.exe 90 PID 2164 wrote to memory of 4716 2164 0162043ff06fc0b7df59995580637c08.exe 92 PID 2164 wrote to memory of 4716 2164 0162043ff06fc0b7df59995580637c08.exe 92 PID 2164 wrote to memory of 4716 2164 0162043ff06fc0b7df59995580637c08.exe 92 PID 2164 wrote to memory of 3620 2164 0162043ff06fc0b7df59995580637c08.exe 95 PID 2164 wrote to memory of 3620 2164 0162043ff06fc0b7df59995580637c08.exe 95 PID 2164 wrote to memory of 3620 2164 0162043ff06fc0b7df59995580637c08.exe 95 PID 2164 wrote to memory of 1916 2164 0162043ff06fc0b7df59995580637c08.exe 96 PID 2164 wrote to memory of 1916 2164 0162043ff06fc0b7df59995580637c08.exe 96 PID 2164 wrote to memory of 1916 2164 0162043ff06fc0b7df59995580637c08.exe 96 PID 2164 wrote to memory of 3884 2164 0162043ff06fc0b7df59995580637c08.exe 98 PID 2164 wrote to memory of 3884 2164 0162043ff06fc0b7df59995580637c08.exe 98 PID 2164 wrote to memory of 3884 2164 0162043ff06fc0b7df59995580637c08.exe 98 PID 2164 wrote to memory of 4416 2164 0162043ff06fc0b7df59995580637c08.exe 102 PID 2164 wrote to memory of 4416 2164 0162043ff06fc0b7df59995580637c08.exe 102 PID 2164 wrote to memory of 4416 2164 0162043ff06fc0b7df59995580637c08.exe 102 PID 4540 wrote to memory of 2688 4540 xrtwpoo.exe 105 PID 4540 wrote to memory of 2688 4540 xrtwpoo.exe 105 PID 4540 wrote to memory of 2688 4540 xrtwpoo.exe 105 PID 4540 wrote to memory of 2688 4540 xrtwpoo.exe 105 PID 4540 wrote to memory of 2688 4540 xrtwpoo.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nszekpmk\2⤵PID:4868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xrtwpoo.exe" C:\Windows\SysWOW64\nszekpmk\2⤵PID:4716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create nszekpmk binPath= "C:\Windows\SysWOW64\nszekpmk\xrtwpoo.exe /d\"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3620
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description nszekpmk "wifi internet conection"2⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start nszekpmk2⤵
- Launches sc.exe
PID:3884
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 11642⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\nszekpmk\xrtwpoo.exeC:\Windows\SysWOW64\nszekpmk\xrtwpoo.exe /d"C:\Users\Admin\AppData\Local\Temp\0162043ff06fc0b7df59995580637c08.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 5562⤵
- Program crash
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2164 -ip 21641⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4540 -ip 45401⤵PID:4772
Network
-
Remote address:8.8.8.8:53Request1.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestmicrosoft.comIN AResponsemicrosoft.comIN A20.112.250.133microsoft.comIN A20.231.239.246microsoft.comIN A20.76.201.171microsoft.comIN A20.70.246.20microsoft.comIN A20.236.44.162
-
Remote address:8.8.8.8:53Requestmicrosoft.comIN MXResponsemicrosoft.comIN MXmicrosoft-commail protectionoutlook�
-
Remote address:8.8.8.8:53Requestmicrosoft-com.mail.protection.outlook.comIN AResponsemicrosoft-com.mail.protection.outlook.comIN A52.101.11.0microsoft-com.mail.protection.outlook.comIN A104.47.53.36microsoft-com.mail.protection.outlook.comIN A52.101.42.0microsoft-com.mail.protection.outlook.comIN A52.101.8.49microsoft-com.mail.protection.outlook.comIN A104.47.54.36
-
Remote address:8.8.8.8:53Request133.250.112.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestyahoo.comIN MXResponseyahoo.comIN MXmta5am0yahoodnsnetyahoo.comIN MXmta7�.yahoo.comIN MXmta6�.
-
Remote address:8.8.8.8:53Requestmta5.am0.yahoodns.netIN AResponsemta5.am0.yahoodns.netIN A67.195.228.94mta5.am0.yahoodns.netIN A98.136.96.91mta5.am0.yahoodns.netIN A98.136.96.77mta5.am0.yahoodns.netIN A67.195.204.72mta5.am0.yahoodns.netIN A67.195.228.111mta5.am0.yahoodns.netIN A98.136.96.75mta5.am0.yahoodns.netIN A67.195.228.106mta5.am0.yahoodns.netIN A67.195.204.77
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 309212
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8E14F34492E5443CB7B0C1C88189B5E4 Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:21Z
date: Sun, 31 Dec 2023 16:27:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301603_1BR89K0OLV9RXH5TJ&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301603_1BR89K0OLV9RXH5TJ&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 162579
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C1C0A36CB4FA4784861E33E8593B6A6D Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:21Z
date: Sun, 31 Dec 2023 16:27:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 150156
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5FFB016E45894F6691E79A50CB27A821 Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:22Z
date: Sun, 31 Dec 2023 16:27:22 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301194_1BB7MER7NWV3AQK9M&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301194_1BB7MER7NWV3AQK9M&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 389552
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1D7F1AACFD764697BE5754A7635EF09B Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:22Z
date: Sun, 31 Dec 2023 16:27:22 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301478_1ATXLTSLM5UX4ZJYP&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301478_1ATXLTSLM5UX4ZJYP&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 308926
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9662309761E24425A029620E224DA0AF Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:22Z
date: Sun, 31 Dec 2023 16:27:22 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301045_1V3F59LO4JDHHM1AD&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301045_1V3F59LO4JDHHM1AD&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 498337
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 885749AC79344D0E8D72C4D0B90D17EB Ref B: LON04EDGE0614 Ref C: 2023-12-31T16:27:22Z
date: Sun, 31 Dec 2023 16:27:22 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Requestgoogle.comIN MXResponsegoogle.comIN MXsmtp�
-
Remote address:8.8.8.8:53Requestsmtp.google.comIN AResponsesmtp.google.comIN A142.251.31.27smtp.google.comIN A142.251.31.26smtp.google.comIN A142.251.18.26smtp.google.comIN A142.250.153.27smtp.google.comIN A142.250.153.26
-
Remote address:8.8.8.8:53Requestsmtp.google.comIN A
-
Remote address:8.8.8.8:53Requestsmtp.google.comIN A
-
Remote address:8.8.8.8:53Request178.178.17.96.in-addr.arpaIN PTRResponse178.178.17.96.in-addr.arpaIN PTRa96-17-178-178deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestmail.ruIN MXResponsemail.ruIN MXmxs�
-
Remote address:8.8.8.8:53Requestmxs.mail.ruIN AResponsemxs.mail.ruIN A217.69.139.150mxs.mail.ruIN A94.100.180.31
-
Remote address:8.8.8.8:53Requestmxs.mail.ruIN AResponsemxs.mail.ruIN A217.69.139.150mxs.mail.ruIN A94.100.180.31
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.1.37.23.in-addr.arpaIN PTRResponse183.1.37.23.in-addr.arpaIN PTRa23-37-1-183deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request201.178.17.96.in-addr.arpaIN PTRResponse201.178.17.96.in-addr.arpaIN PTRa96-17-178-201deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request201.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request211.135.221.88.in-addr.arpaIN PTRResponse211.135.221.88.in-addr.arpaIN PTRa88-221-135-211deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request181.178.17.96.in-addr.arpaIN PTRResponse181.178.17.96.in-addr.arpaIN PTRa96-17-178-181deploystaticakamaitechnologiescom
-
190 B 92 B 4 2
-
260 B 5
-
260 B 5
-
260 B 5
-
1.9kB 8.2kB 18 13
-
1.6kB 8.7kB 17 14
-
1.9kB 8.2kB 18 13
-
1.2kB 8.3kB 15 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301045_1V3F59LO4JDHHM1AD&pid=21.2&w=1920&h=1080&c=4tls, http259.6kB 1.6MB 1205 1199
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301195_10TKS815IX0MOD3NX&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301603_1BR89K0OLV9RXH5TJ&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301604_1H6WK0590WT095LZX&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301194_1BB7MER7NWV3AQK9M&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301478_1ATXLTSLM5UX4ZJYP&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301045_1V3F59LO4JDHHM1AD&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
71 B 157 B 1 1
DNS Request
1.181.190.20.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
158.240.127.40.in-addr.arpa
DNS Request
158.240.127.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
175.178.17.96.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
208.194.73.20.in-addr.arpa
DNS Request
208.194.73.20.in-addr.arpa
-
59 B 139 B 1 1
DNS Request
microsoft.com
DNS Response
20.112.250.13320.231.239.24620.76.201.17120.70.246.2020.236.44.162
-
59 B 113 B 1 1
DNS Request
microsoft.com
-
87 B 167 B 1 1
DNS Request
microsoft-com.mail.protection.outlook.com
DNS Response
52.101.11.0104.47.53.3652.101.42.052.101.8.49104.47.54.36
-
73 B 159 B 1 1
DNS Request
133.250.112.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
171.39.242.20.in-addr.arpa
DNS Request
171.39.242.20.in-addr.arpa
DNS Request
171.39.242.20.in-addr.arpa
-
55 B 134 B 1 1
DNS Request
yahoo.com
-
67 B 195 B 1 1
DNS Request
mta5.am0.yahoodns.net
DNS Response
67.195.228.9498.136.96.9198.136.96.7767.195.204.7267.195.228.11198.136.96.7567.195.228.10667.195.204.77
-
142 B 135 B 2 1
DNS Request
41.110.16.96.in-addr.arpa
DNS Request
41.110.16.96.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
59.128.231.4.in-addr.arpa
DNS Request
59.128.231.4.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
56 B 77 B 1 1
DNS Request
google.com
-
183 B 141 B 3 1
DNS Request
smtp.google.com
DNS Request
smtp.google.com
DNS Request
smtp.google.com
DNS Response
142.251.31.27142.251.31.26142.251.18.26142.250.153.27142.250.153.26
-
72 B 137 B 1 1
DNS Request
178.178.17.96.in-addr.arpa
-
53 B 73 B 1 1
DNS Request
mail.ru
-
114 B 178 B 2 2
DNS Request
mxs.mail.ru
DNS Request
mxs.mail.ru
DNS Response
217.69.139.15094.100.180.31
DNS Response
217.69.139.15094.100.180.31
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
183.1.37.23.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
119.110.54.20.in-addr.arpa
DNS Request
119.110.54.20.in-addr.arpa
DNS Request
119.110.54.20.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
201.178.17.96.in-addr.arpa
DNS Request
201.178.17.96.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
211.135.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
181.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.1MB
MD5e4263d4b11d27626ae666d8faa3ee018
SHA175b8f8eae78b4b6d0f860444cfffa7eb9b6b74b5
SHA25689bbe318dbe34253046f55752d806eca06dab14c26362e62b223234ca04c5f37
SHA512affffbb21ce5026ea88f6b7d4b732b9f7a08731917dd57bea89d655a00ec66d0a141c8eed7ad8257db5f5a5561104fb9a76f3b869e9e7c66d1397917310a7249
-
Filesize
10.7MB
MD52866ab644ada607fb12947f7807843c3
SHA141cc9d1dfe60b330d3a7b043442af4881922d2bf
SHA256911957122f2dd571e29e5ee3ebb7e70b85ecd1a7b16fbbac2bee2f55d5157df6
SHA512abb19685e7994b8805a6ee98f1f5875815dd5638695517cadbde78eb93222d334981e8f7ca6251c29ff5aac4d80ee99b5c5fdcbfff91fdf425d0970e1ec3a08e