Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 23:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
-
Size
344KB
-
MD5
f9f091755ec8e73248248dab8322d626
-
SHA1
e67c131ba30b9fcc039338a26120903f4481e137
-
SHA256
a683ca42892015abfce890026163ee73c199a2d602acc00e0e04a3bc71f428ad
-
SHA512
e6d5c1d6854c11b5be3197f643ef3bffc83af6ad87037a652f72c750d1014934a78b8ae7bbfead86446b08181eb1bb79cd33421c1f78381ea3c3fc05b737a9ad
-
SSDEEP
6144:+Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:+TBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 wlogon32.exe 3712 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\ = "haldriver" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\ = "Application" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\DefaultIcon 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\DefaultIcon 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2352 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"3⤵
- Executes dropped EXE
PID:3712
-
-
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.241.123.92.in-addr.arpaIN PTRResponse104.241.123.92.in-addr.arpaIN PTRa92-123-241-104deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Request68.179.17.96.in-addr.arpaIN PTRResponse68.179.17.96.in-addr.arpaIN PTRa96-17-179-68deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request32.134.221.88.in-addr.arpaIN PTRResponse32.134.221.88.in-addr.arpaIN PTRa88-221-134-32deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Request61.179.17.96.in-addr.arpaIN PTRResponse61.179.17.96.in-addr.arpaIN PTRa96-17-179-61deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.179.17.96.in-addr.arpaIN PTRResponse55.179.17.96.in-addr.arpaIN PTRa96-17-179-55deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request42.134.221.88.in-addr.arpaIN PTRResponse42.134.221.88.in-addr.arpaIN PTRa88-221-134-42deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request42.134.221.88.in-addr.arpaIN PTRResponse42.134.221.88.in-addr.arpaIN PTRa88-221-134-42deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN A
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 431671
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0B61F0A2C4F94BE0902A7CA1E104EA0A Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:11Z
date: Mon, 18 Mar 2024 23:49:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360494466_1NE7RS5P7DA5W3Y3W&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360494466_1NE7RS5P7DA5W3Y3W&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 312669
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 69C054A9B37A47CF809E76C73BCF5ED8 Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:11Z
date: Mon, 18 Mar 2024 23:49:11 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 369915
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A4F8F3DBAC054BC894EA8F5F8133AD9F Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:12Z
date: Mon, 18 Mar 2024 23:49:11 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301726_1E13SDDIEAACEBOJ3&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301726_1E13SDDIEAACEBOJ3&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 339887
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 975C17CC4BBF406EA9A8AD5AA9C81D68 Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:12Z
date: Mon, 18 Mar 2024 23:49:11 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360494465_1WL11PE3QHWZ3Q9V1&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360494465_1WL11PE3QHWZ3Q9V1&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 212593
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1264F7F97BC548089F1698A6520EB680 Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:12Z
date: Mon, 18 Mar 2024 23:49:11 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301317_1SANBEH786QEYU6TN&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301317_1SANBEH786QEYU6TN&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 278503
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A753E08A847643D1B96303C4BEBF99F9 Ref B: LON04EDGE1217 Ref C: 2024-03-18T23:49:12Z
date: Mon, 18 Mar 2024 23:49:11 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Requestnwoccs.zapto.orgIN AResponse
-
46 B 1
-
1.6kB 8.1kB 17 14
-
1.6kB 8.1kB 17 14
-
1.6kB 8.1kB 18 14
-
1.3kB 679 B 13 9
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301317_1SANBEH786QEYU6TN&pid=21.2&w=1920&h=1080&c=4tls, http272.3kB 2.0MB 1473 1471
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418540_1UQTKN6JO04LNXB5Q&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360494466_1NE7RS5P7DA5W3Y3W&pid=21.2&w=1080&h=1920&c=4HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418539_1KFG8UNZE5MUR2Y24&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301726_1E13SDDIEAACEBOJ3&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360494465_1WL11PE3QHWZ3Q9V1&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301317_1SANBEH786QEYU6TN&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
nwoccs.zapto.org
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
210 B 156 B 3 1
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
104.241.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.204.248.87.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
nwoccs.zapto.org
-
71 B 135 B 1 1
DNS Request
68.179.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
32.134.221.88.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
nwoccs.zapto.org
-
71 B 135 B 1 1
DNS Request
61.179.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
55.179.17.96.in-addr.arpa
-
144 B 274 B 2 2
DNS Request
42.134.221.88.in-addr.arpa
DNS Request
42.134.221.88.in-addr.arpa
-
124 B 122 B 2 1
DNS Request
nwoccs.zapto.org
DNS Request
nwoccs.zapto.org
-
144 B 158 B 2 1
DNS Request
13.227.111.52.in-addr.arpa
DNS Request
13.227.111.52.in-addr.arpa
-
124 B 346 B 2 2
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
DNS Response
204.79.197.20013.107.21.200
-
146 B 212 B 2 2
DNS Request
200.197.79.204.in-addr.arpa
DNS Request
200.197.79.204.in-addr.arpa
-
124 B 244 B 2 2
DNS Request
nwoccs.zapto.org
DNS Request
nwoccs.zapto.org
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD547d85af45b26c404d827ae92d4067378
SHA1c542542b1dcfa63c81fe80658888522580e274bb
SHA2569eff225ebbc999f1565a8e0eb2209f192ce5c0830697a4a83b5caba5b8c0a2d1
SHA512fff0e883847bd095d3988f24d525499d0288a353ae818814f52ce2bbfbf48c4a9e5e47623fec9c569df38693c1b7eff34d3438f3e29f04371b0d80410ee0a22b