Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 01:59 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe
Resource
win10v2004-20240226-en
General
-
Target
f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe
-
Size
900KB
-
MD5
41cdecbfc109b4aa4d24d01928711bcc
-
SHA1
b66575de665f14bb4d526c59072ae8741d16c695
-
SHA256
f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020
-
SHA512
e1d20053d60ca2530a95506f9fb8e11c0ab81761784ec3919cee5c1f75a50271b1eb0fb775ed40e0afdb2d45184bef778c8faf2c28b733f86bf190ca61432c96
-
SSDEEP
12288:C/31uTMGUdLPpXpZ1/9wg3NMEe1I/NcfmAdsp163LDtIng5i7n8pkPAjLk:HUdLPl1/n03Zw16bDtRw85Lk
Malware Config
Extracted
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
dtker@deconbrio.com - Password:
Smartooo@123#
Extracted
agenttesla
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
dtker@deconbrio.com - Password:
Smartooo@123# - Email To:
dtker@deconbrio.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 64 set thread context of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 4080 powershell.exe 4080 powershell.exe 2308 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 2308 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 2308 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 4080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe Token: SeDebugPrivilege 4080 powershell.exe Token: SeDebugPrivilege 2308 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 64 wrote to memory of 4080 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 98 PID 64 wrote to memory of 4080 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 98 PID 64 wrote to memory of 4080 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 98 PID 64 wrote to memory of 3836 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 100 PID 64 wrote to memory of 3836 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 100 PID 64 wrote to memory of 3836 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 100 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102 PID 64 wrote to memory of 2308 64 f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe"C:\Users\Admin\AppData\Local\Temp\f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zHGPKZuJI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zHGPKZuJI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp85F9.tmp"2⤵
- Creates scheduled task(s)
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe"C:\Users\Admin\AppData\Local\Temp\f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requestg.bing.comIN A
-
Remote address:8.8.8.8:53Request71.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1AE58E763D5C62A618FD9A363CBC6352; domain=.bing.com; expires=Sun, 06-Apr-2025 01:59:43 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D3E8E109F9ED47899CB957D287B5121E Ref B: LON04EDGE1111 Ref C: 2024-03-12T01:59:43Z
date: Tue, 12 Mar 2024 01:59:43 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1AE58E763D5C62A618FD9A363CBC6352
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=gi5Uod6zlCXMBUG-oa4r4LKhfgW_KoMhXTdTB8idK6A; domain=.bing.com; expires=Sun, 06-Apr-2025 01:59:44 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CC10697CE59645C9B734ADD8DA261EC0 Ref B: LON04EDGE1111 Ref C: 2024-03-12T01:59:44Z
date: Tue, 12 Mar 2024 01:59:43 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1AE58E763D5C62A618FD9A363CBC6352; MSPTC=gi5Uod6zlCXMBUG-oa4r4LKhfgW_KoMhXTdTB8idK6A
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 24B51E58EDA644D7BBC51EC0B5C0C146 Ref B: LON04EDGE1111 Ref C: 2024-03-12T01:59:44Z
date: Tue, 12 Mar 2024 01:59:43 GMT
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
GEThttp://ip-api.com/line/?fields=hostingf5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exeRemote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 6
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Request104.241.123.92.in-addr.arpaIN PTRResponse104.241.123.92.in-addr.arpaIN PTRa92-123-241-104deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
DNSshared167.accountservergroup.comf5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exeRemote address:8.8.8.8:53Requestshared167.accountservergroup.comIN AResponseshared167.accountservergroup.comIN A143.95.156.49
-
Remote address:8.8.8.8:53Request49.156.95.143.in-addr.arpaIN PTRResponse49.156.95.143.in-addr.arpaIN PTRip-143-95-156-49iplocal
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request176.178.17.96.in-addr.arpaIN PTRResponse176.178.17.96.in-addr.arpaIN PTRa96-17-178-176deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request211.135.221.88.in-addr.arpaIN PTRResponse211.135.221.88.in-addr.arpaIN PTRa88-221-135-211deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418576_1P0LP58U9FRUO4PCP&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418576_1P0LP58U9FRUO4PCP&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 295842
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 19AC8DB09D634065B22B4945591E99FA Ref B: LON04EDGE1115 Ref C: 2024-03-12T02:01:19Z
date: Tue, 12 Mar 2024 02:01:18 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418575_1DFGQU5CLQUV7W36O&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418575_1DFGQU5CLQUV7W36O&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 182865
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 98EF0FACF8914BF29EDDBF37A04B74A9 Ref B: LON04EDGE1115 Ref C: 2024-03-12T02:01:19Z
date: Tue, 12 Mar 2024 02:01:18 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 276068
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 56111C1B139C4CEEA70BE5D574DCDD7A Ref B: LON04EDGE1115 Ref C: 2024-03-12T02:01:19Z
date: Tue, 12 Mar 2024 02:01:18 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 169683
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5F8E0D8D73DC450D92C2F0D5D8F47909 Ref B: LON04EDGE1115 Ref C: 2024-03-12T02:01:19Z
date: Tue, 12 Mar 2024 02:01:18 GMT
-
Remote address:8.8.8.8:53Request88.65.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.65.42.20.in-addr.arpaIN PTRResponse
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=tls, http22.6kB 9.1kB 23 16
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=b9b38ec15aba41a094fea48f31b58d50&localId=w:2A4A5216-14B0-E8AC-6F68-A550B400FC9F&deviceId=6825825927701325&anid=HTTP Response
204 -
208.95.112.1:80http://ip-api.com/line/?fields=hostinghttpf5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe316 B 307 B 5 3
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200 -
143.95.156.49:587shared167.accountservergroup.comsmtp-submissionf5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe4.3kB 7.4kB 27 24
-
1.2kB 8.1kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4tls, http236.3kB 964.6kB 712 710
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418576_1P0LP58U9FRUO4PCP&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418575_1DFGQU5CLQUV7W36O&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 16 14
-
112 B 158 B 2 1
DNS Request
g.bing.com
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 158 B 1 1
DNS Request
71.159.190.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
142 B 135 B 2 1
DNS Request
41.110.16.96.in-addr.arpa
DNS Request
41.110.16.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
183.142.211.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
73 B 139 B 1 1
DNS Request
104.241.123.92.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
8.8.8.8:53shared167.accountservergroup.comdnsf5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe78 B 94 B 1 1
DNS Request
shared167.accountservergroup.com
DNS Response
143.95.156.49
-
72 B 110 B 1 1
DNS Request
49.156.95.143.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
176.178.17.96.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
211.135.221.88.in-addr.arpa
-
146 B 278 B 2 2
DNS Request
217.135.221.88.in-addr.arpa
DNS Request
217.135.221.88.in-addr.arpa
-
146 B 288 B 2 2
DNS Request
240.221.184.93.in-addr.arpa
DNS Request
240.221.184.93.in-addr.arpa
-
144 B 316 B 2 2
DNS Request
30.243.111.52.in-addr.arpa
DNS Request
30.243.111.52.in-addr.arpa
-
124 B 346 B 2 2
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
DNS Response
204.79.197.20013.107.21.200
-
140 B 312 B 2 2
DNS Request
88.65.42.20.in-addr.arpa
DNS Request
88.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f5ab115821d29f1d0825081266b7b89d63679200322b2568413577023a84a020.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD566907046863beb9a60117f804b154257
SHA19d5d014cc2e8999ed6e8a6cf70519e734783f18b
SHA2567de9323e3774b0297b7a152e605f33e1842b7653c2eccf5adc36d2571baca9a0
SHA5129687e71652b375737552605572779def341b10c01f780fbab5bd9df64783a50f8974c464157e964a9b5df093de19c32c1ddab8090de1107ea5e2a873e0458f1c