Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 14:09 UTC
Static task
static1
Behavioral task
behavioral1
Sample
374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe
Resource
win10v2004-20240226-en
General
-
Target
374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe
-
Size
372KB
-
MD5
05f62ecabc68ee01d8274a3c97f5b101
-
SHA1
8128819b7fa55a7a331e933fce52051c66d5e72d
-
SHA256
374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a
-
SHA512
e53afc5c9f4cba52c521dbc6f24144bce4f182bdc40a39f94b0005d335cd5384472c48fb04b1e1f6e9dc0a94e58739d6ccda4eff9114f5020054a95c7b903df8
-
SSDEEP
6144:MfkWFheyVxcO8fo66ZYB9LEpvkWohWS4rNaLGU:BAVgfl6iYpcWot5
Malware Config
Extracted
C:\HOW TO BACK FILES.txt
targetcompany
mallox@onionmail.org
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
TargetCompany,Mallox
TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4808 bcdedit.exe 852 bcdedit.exe -
Renames multiple (769) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\U: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\B: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\H: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\L: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\M: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\N: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\P: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\W: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\D: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\E: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\R: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\V: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\A: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\G: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\J: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\K: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\O: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\Q: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\X: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\Y: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\Z: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\I: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened (read-only) \??\S: 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Updates\Download\PackageFiles\EFDFFF65-1A55-4E3F-ADB6-89E563AD2004\root\vfs\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\Notifications\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pl-pl\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\css\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.52\identity_proxy\win11\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Grace-ppd.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription3-ppd.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\et\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-pl.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-pl.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\tr\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\SuggestionsService\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\nb-no\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\it-it\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pl-pl\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleAppAssets\Videos\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0409-1000-0000000FF1CE.xml 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\AppxMetadata\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\he-il\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ro-ro\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-pl.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-us\View3d\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nl-nl\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fi-fi\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp-pl.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-sl\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sv-se\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ar\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O17EnterpriseVL_Bypass30-ul-oob.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Subscription-ul-oob.xrm-ms 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\da-dk\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\cs-CZ\HOW TO BACK FILES.txt 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeDebugPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe Token: SeTakeOwnershipPrivilege 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3052 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe 98 PID 3696 wrote to memory of 3052 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe 98 PID 3696 wrote to memory of 2316 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe 100 PID 3696 wrote to memory of 2316 3696 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe 100 PID 2316 wrote to memory of 852 2316 cmd.exe 102 PID 2316 wrote to memory of 852 2316 cmd.exe 102 PID 3052 wrote to memory of 4808 3052 cmd.exe 103 PID 3052 wrote to memory of 4808 3052 cmd.exe 103 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe"C:\Users\Admin\AppData\Local\Temp\374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3696 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:4808
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:852
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:1536
Network
-
Remote address:8.8.8.8:53Request206.178.17.96.in-addr.arpaIN PTRResponse206.178.17.96.in-addr.arpaIN PTRa96-17-178-206deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.ipify.orgIN AResponseapi.ipify.orgIN A104.26.12.205api.ipify.orgIN A172.67.74.152api.ipify.orgIN A104.26.13.205
-
Remote address:104.26.12.205:80RequestGET / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: api.ipify.org
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 12
Connection: keep-alive
Vary: Origin
CF-Cache-Status: DYNAMIC
Server: cloudflare
CF-RAY: 861ba577fcb87332-LHR
-
POSThttp://91.215.85.142/QWEwqdsvsf/ap.php374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exeRemote address:91.215.85.142:80RequestPOST /QWEwqdsvsf/ap.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 91.215.85.142
Content-Length: 160
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Sat, 09 Mar 2024 14:10:04 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/7.4.33
-
Remote address:8.8.8.8:53Request205.12.26.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request142.85.215.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=040BDC3BCDC861F80600C806CCEF6063; domain=.bing.com; expires=Thu, 03-Apr-2025 14:10:37 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BF7A0AD5C7BA49198791148655F034A8 Ref B: LON04EDGE0615 Ref C: 2024-03-09T14:10:37Z
date: Sat, 09 Mar 2024 14:10:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=040BDC3BCDC861F80600C806CCEF6063
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=URM69m-SgORHWD7bbhVzGHCu_wt-s4GIQxtuUq09JY8; domain=.bing.com; expires=Thu, 03-Apr-2025 14:10:37 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 816DAFA03ABA479AADAEFEA07252B557 Ref B: LON04EDGE0615 Ref C: 2024-03-09T14:10:37Z
date: Sat, 09 Mar 2024 14:10:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=040BDC3BCDC861F80600C806CCEF6063; MSPTC=URM69m-SgORHWD7bbhVzGHCu_wt-s4GIQxtuUq09JY8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BB4AD5665A384BBEBD75FE80594B048F Ref B: LON04EDGE0615 Ref C: 2024-03-09T14:10:37Z
date: Sat, 09 Mar 2024 14:10:37 GMT
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request185.178.17.96.in-addr.arpaIN PTRResponse185.178.17.96.in-addr.arpaIN PTRa96-17-178-185deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request185.178.17.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTR
-
104.26.12.205:80http://api.ipify.org/http374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe413 B 400 B 6 4
HTTP Request
GET http://api.ipify.org/HTTP Response
200 -
91.215.85.142:80http://91.215.85.142/QWEwqdsvsf/ap.phphttp374a979d2b8b45d23e3310676256624ab96bd604c2eb11f327c3e5044a95654a.exe612 B 437 B 6 5
HTTP Request
POST http://91.215.85.142/QWEwqdsvsf/ap.phpHTTP Response
200 -
260 B 5
-
260 B 5
-
46 B 1
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=tls, http22.0kB 9.2kB 21 18
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=8c8bda9c3843499ea8c00f67932bec6d&localId=w:AE07C56D-9F7E-DB3B-D18D-2459C76F841B&deviceId=6825825924912662&anid=HTTP Response
204 -
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
156 B 3
-
72 B 137 B 1 1
DNS Request
206.178.17.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
59 B 107 B 1 1
DNS Request
api.ipify.org
DNS Response
104.26.12.205172.67.74.152104.26.13.205
-
72 B 134 B 1 1
DNS Request
205.12.26.104.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
142.85.215.91.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
175.178.17.96.in-addr.arpa
DNS Request
175.178.17.96.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
144 B 137 B 2 1
DNS Request
185.178.17.96.in-addr.arpa
DNS Request
185.178.17.96.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
10.173.189.20.in-addr.arpa
DNS Request
10.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5939909eb53710f611df0377c28593e46
SHA1f3538bf16101461c48da6779ce6b0574f8ea6100
SHA25615dc929fe63449daceed96a8b2d14836f402171561ab692d3d2fa23f1155b547
SHA512683df4a3ee8808f39958794c73391267955d780c36b0b6907b860aeced68a05ef69ee4d3238fd100940958e2d762d44600eca9896a88290855341979044cfbc2
-
Filesize
4KB
MD5bf2abe322b3d0981850886a5355cd850
SHA17d2360363dabb0bd08f5d6b0e13cd4e63dd0874a
SHA2560fd376e8c35bb81af2b13b0247ab356d8029dd108efd86e0ebe3552efa716839
SHA512bb24af862e149ef3f91b96572d285f8ea7b601e722567a58e8d1cdb1e730dda78acae85b2d7af6935238627f07eecd60bb05e20e9f99b8b5a8e3d0c09f3ac0b8
-
Filesize
2KB
MD567c98b54df6ff8667daca52feea6af47
SHA1304aa9cae495bcb66b2fe334392709d24ae11131
SHA256530cdcf584492ba98ae0eefe00621aa41d4fc51e42586316de496f0dc1ac41f0
SHA5124cf4be1586b11ea28aee5f4327fc333ac678642e3ab243d46e3d6a7a829918a1f54f63ca2717fba9fe92dbcdbfa36405db895e36c77f5837488f1912b5fa5f31
-
Filesize
5KB
MD57652e2815eb7981f6122f26b74552806
SHA1442e5155373db3528aeac459ca92ed21da32a1e0
SHA256093d934a0cb6e3b3e1437d7ae25c4a0bc97267967474d53963cda16bf2746ba3
SHA5128b1ce7a89f50c6bc637f3eaa7d0983435a9fb4e3d84046ced9b06aa8d6441b82ab159dbb622a3348bab6aaa2554aa69fed31db66dec13af534b3e5a3bc7069e5