Overview
overview
7Static
static
3nmap-7.60/...32.dll
windows7-x64
1nmap-7.60/...32.dll
windows10-2004-x64
1nmap-7.60/libssh2.dll
windows7-x64
3nmap-7.60/libssh2.dll
windows10-2004-x64
3nmap-7.60/ncat.exe
windows7-x64
1nmap-7.60/ncat.exe
windows10-2004-x64
1nmap-7.60/ndiff.bat
windows7-x64
1nmap-7.60/ndiff.bat
windows10-2004-x64
1nmap-7.60/ndiff.py
ubuntu-18.04-amd64
1nmap-7.60/ndiff.py
debian-9-armhf
1nmap-7.60/ndiff.py
debian-9-mips
1nmap-7.60/ndiff.py
debian-9-mipsel
1nmap-7.60/...te.exe
windows7-x64
1nmap-7.60/...te.exe
windows10-2004-x64
1nmap-7.60/nmap.exe
windows7-x64
1nmap-7.60/nmap.exe
windows10-2004-x64
1nmap-7.60/...93.exe
windows7-x64
7nmap-7.60/...93.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3DiagReport.bat
windows7-x64
1DiagReport.bat
windows10-2004-x64
1DiagReport.ps1
windows7-x64
1DiagReport.ps1
windows10-2004-x64
1NPFInstall.exe
windows7-x64
4NPFInstall.exe
windows10-2004-x64
4NPFInstall2.exe
windows7-x64
4NPFInstall2.exe
windows10-2004-x64
4nmap-7.60/nping.exe
windows7-x64
1nmap-7.60/nping.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 06:27 UTC
Static task
static1
Behavioral task
behavioral1
Sample
nmap-7.60/libeay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nmap-7.60/libeay32.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
nmap-7.60/libssh2.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
nmap-7.60/libssh2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
nmap-7.60/ncat.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
nmap-7.60/ncat.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
nmap-7.60/ndiff.bat
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nmap-7.60/ndiff.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
nmap-7.60/ndiff.py
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral10
Sample
nmap-7.60/ndiff.py
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral11
Sample
nmap-7.60/ndiff.py
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral12
Sample
nmap-7.60/ndiff.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral13
Sample
nmap-7.60/nmap-update.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
nmap-7.60/nmap-update.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
nmap-7.60/nmap.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
nmap-7.60/nmap.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
nmap-7.60/npcap-0.93.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
nmap-7.60/npcap-0.93.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
DiagReport.bat
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
DiagReport.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
DiagReport.ps1
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
DiagReport.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
NPFInstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
NPFInstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
NPFInstall2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
NPFInstall2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
nmap-7.60/nping.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
nmap-7.60/nping.exe
Resource
win10v2004-20240412-en
General
-
Target
DiagReport.ps1
-
Size
8KB
-
MD5
7457f5e88035d91752f988df57aa0689
-
SHA1
8cbd43f00fdc2ae2b0ac7429454eb7708031ee70
-
SHA256
4180f15d32e84d1f3ed1c256bdc86f73d96e6615b3a10bf67bfc50c30a9912ed
-
SHA512
2ccfe0eb0724461fc123f9693724386426497ed7236a5180475223528610216dab9f5b4d61a53dc6882322aec3414b7b9a1c39d651a6a289ba40e29d51575916
-
SSDEEP
96:4g+14dBdsaHQCMMavbtBG7IYMGOUU+Sz1ROVP7BNE9dn:4x4dBdsaHQZMay6W1X3Kh
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 powershell.exe 5016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 5016 powershell.exe Token: SeIncreaseQuotaPrivilege 5016 powershell.exe Token: SeSecurityPrivilege 5016 powershell.exe Token: SeTakeOwnershipPrivilege 5016 powershell.exe Token: SeLoadDriverPrivilege 5016 powershell.exe Token: SeSystemProfilePrivilege 5016 powershell.exe Token: SeSystemtimePrivilege 5016 powershell.exe Token: SeProfSingleProcessPrivilege 5016 powershell.exe Token: SeIncBasePriorityPrivilege 5016 powershell.exe Token: SeCreatePagefilePrivilege 5016 powershell.exe Token: SeBackupPrivilege 5016 powershell.exe Token: SeRestorePrivilege 5016 powershell.exe Token: SeShutdownPrivilege 5016 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeSystemEnvironmentPrivilege 5016 powershell.exe Token: SeRemoteShutdownPrivilege 5016 powershell.exe Token: SeUndockPrivilege 5016 powershell.exe Token: SeManageVolumePrivilege 5016 powershell.exe Token: 33 5016 powershell.exe Token: 34 5016 powershell.exe Token: 35 5016 powershell.exe Token: 36 5016 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1428 5016 powershell.exe 93 PID 5016 wrote to memory of 1428 5016 powershell.exe 93
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\DiagReport.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" C:\Users\Admin\AppData\Local\Temp\DiagReport-20240420-062741.txt2⤵PID:1428
-
Network
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.173.246.72.in-addr.arpaIN PTRResponse154.173.246.72.in-addr.arpaIN PTRa72-246-173-154deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request154.173.246.72.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request206.221.208.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.221.208.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request65.139.73.23.in-addr.arpaIN PTRResponse65.139.73.23.in-addr.arpaIN PTRa23-73-139-65deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request82.90.14.23.in-addr.arpaIN PTRResponse82.90.14.23.in-addr.arpaIN PTRa23-14-90-82deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.251.17.2.in-addr.arpaIN PTRResponse14.251.17.2.in-addr.arpaIN PTRa2-17-251-14deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.251.17.2.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239379020259_1MTCL64ZPZEVVZYTO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239379020259_1MTCL64ZPZEVVZYTO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 394521
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QUZE
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6C05C42D6BDF42A480FE852C85539656 Ref B: LON04EDGE0822 Ref C: 2024-04-20T06:29:29Z
date: Sat, 20 Apr 2024 06:29:28 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239379020263_17VP6C6AYNDRM0YJL&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239379020263_17VP6C6AYNDRM0YJL&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 553630
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3DFB4EA6B68A4179A8EFBFACD0844C0D Ref B: LON04EDGE0822 Ref C: 2024-04-20T06:29:29Z
date: Sat, 20 Apr 2024 06:29:28 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 556352
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QUZE
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 64F4310CB7DD4EB8BA3BA5A330866350 Ref B: LON04EDGE0822 Ref C: 2024-04-20T06:29:29Z
date: Sat, 20 Apr 2024 06:29:28 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 442324
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7507398E505B4DA0A96BC235A4CDB169 Ref B: LON04EDGE0822 Ref C: 2024-04-20T06:29:29Z
date: Sat, 20 Apr 2024 06:29:28 GMT
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
1.5kB 8.1kB 17 13
-
1.8kB 8.1kB 18 13
-
1.8kB 8.1kB 18 13
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http272.4kB 2.0MB 1501 1492
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239379020259_1MTCL64ZPZEVVZYTO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239379020263_17VP6C6AYNDRM0YJL&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
144 B 146 B 2 1
DNS Request
26.165.165.52.in-addr.arpa
DNS Request
26.165.165.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
146 B 139 B 2 1
DNS Request
154.173.246.72.in-addr.arpa
DNS Request
154.173.246.72.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
206.221.208.4.in-addr.arpa
DNS Request
206.221.208.4.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
65.139.73.23.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
82.90.14.23.in-addr.arpa
-
140 B 133 B 2 1
DNS Request
14.251.17.2.in-addr.arpa
DNS Request
14.251.17.2.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
14.227.111.52.in-addr.arpa
DNS Request
14.227.111.52.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
142 B 314 B 2 2
DNS Request
43.58.199.20.in-addr.arpa
DNS Request
43.58.199.20.in-addr.arpa
-
146 B 212 B 2 2
DNS Request
200.197.79.204.in-addr.arpa
DNS Request
200.197.79.204.in-addr.arpa
-
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD56ab4982d6b6180318dec7dfc7419ea53
SHA139dbfb9082ac9188f94b54f78d91e4305bca5b83
SHA25683b7f8ea4f87cfd393df7279ebac5a02b5687bb62f5193f9a1a020d8986442fa
SHA512f79978c6dc6fda67b82580b3a102204991e21db7f0c76e8ce6b78fe807f6ae40d15ce1d4a6833a916b526efba26ec40527d819d41137c3d406928b804738e0b1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82