Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 02:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe
Resource
win7-20240215-en
General
-
Target
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe
-
Size
2.6MB
-
MD5
942e6d4d79fafc99f4339e0cd957675d
-
SHA1
03f5cadf461749cd06cd4defd93e31e3ce9e716f
-
SHA256
f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621
-
SHA512
1192451b24280780b65881c4a27b09cbe98fccc836819832554796d0dd966ab29dfe27afd0476efb2f73689b992813a8e63f1525c49395a5d41e3a90493a3130
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXSmHdqf0K44JzixdvW80EXLq31gEfUvWDyBFZpxx9:Hh+ZkldoPKiYdqd6l
Malware Config
Extracted
orcus
ligeon
ligeon.ddns.net:1606
b98fb09a59c24a81b9d17a55ccf2c036
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%programfiles%\Orcus\Orcus.exe
-
reconnect_delay
10000
-
registry_keyname
Orcus
-
taskscheduler_taskname
Orcus
-
watchdog_path
AppData\OrcusWatchdog.exe
Signatures
-
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral2/memory/3676-2-0x00000000007A0000-0x000000000088A000-memory.dmp orcus behavioral2/memory/1872-25-0x0000000000400000-0x00000000004EA000-memory.dmp orcus behavioral2/memory/4116-37-0x0000000000500000-0x00000000005EA000-memory.dmp orcus -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation setspn.exe Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation setspn.exe Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation setspn.exe -
Executes dropped EXE 3 IoCs
pid Process 2016 setspn.exe 1988 setspn.exe 244 setspn.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4896-0-0x0000000000CD0000-0x0000000000F7A000-memory.dmp autoit_exe behavioral2/files/0x0008000000023407-21.dat autoit_exe behavioral2/memory/2016-22-0x0000000000C70000-0x0000000000F1A000-memory.dmp autoit_exe behavioral2/memory/1988-36-0x0000000000C70000-0x0000000000F1A000-memory.dmp autoit_exe behavioral2/memory/4116-44-0x0000000004A50000-0x0000000004A60000-memory.dmp autoit_exe behavioral2/memory/244-47-0x0000000000C70000-0x0000000000F1A000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4896 set thread context of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 2016 set thread context of 1872 2016 setspn.exe 102 PID 1988 set thread context of 4116 1988 setspn.exe 113 PID 244 set thread context of 5028 244 setspn.exe 124 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4724 schtasks.exe 3596 schtasks.exe 1812 schtasks.exe 4504 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 2016 setspn.exe 2016 setspn.exe 2016 setspn.exe 2016 setspn.exe 1988 setspn.exe 1988 setspn.exe 1988 setspn.exe 1988 setspn.exe 244 setspn.exe 244 setspn.exe 244 setspn.exe 244 setspn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3676 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3676 RegSvcs.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4896 wrote to memory of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 4896 wrote to memory of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 4896 wrote to memory of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 4896 wrote to memory of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 4896 wrote to memory of 3676 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 95 PID 4896 wrote to memory of 4724 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 96 PID 4896 wrote to memory of 4724 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 96 PID 4896 wrote to memory of 4724 4896 f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe 96 PID 2016 wrote to memory of 1872 2016 setspn.exe 102 PID 2016 wrote to memory of 1872 2016 setspn.exe 102 PID 2016 wrote to memory of 1872 2016 setspn.exe 102 PID 2016 wrote to memory of 1872 2016 setspn.exe 102 PID 2016 wrote to memory of 1872 2016 setspn.exe 102 PID 2016 wrote to memory of 3596 2016 setspn.exe 103 PID 2016 wrote to memory of 3596 2016 setspn.exe 103 PID 2016 wrote to memory of 3596 2016 setspn.exe 103 PID 1988 wrote to memory of 4116 1988 setspn.exe 113 PID 1988 wrote to memory of 4116 1988 setspn.exe 113 PID 1988 wrote to memory of 4116 1988 setspn.exe 113 PID 1988 wrote to memory of 4116 1988 setspn.exe 113 PID 1988 wrote to memory of 4116 1988 setspn.exe 113 PID 1988 wrote to memory of 1812 1988 setspn.exe 114 PID 1988 wrote to memory of 1812 1988 setspn.exe 114 PID 1988 wrote to memory of 1812 1988 setspn.exe 114 PID 244 wrote to memory of 5028 244 setspn.exe 124 PID 244 wrote to memory of 5028 244 setspn.exe 124 PID 244 wrote to memory of 5028 244 setspn.exe 124 PID 244 wrote to memory of 5028 244 setspn.exe 124 PID 244 wrote to memory of 5028 244 setspn.exe 124 PID 244 wrote to memory of 4504 244 setspn.exe 125 PID 244 wrote to memory of 4504 244 setspn.exe 125 PID 244 wrote to memory of 4504 244 setspn.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe"C:\Users\Admin\AppData\Local\Temp\f37efd5834c04b7f90ee50188474ebc8a917f83a48edd87e7a0556415f0b3621.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4724
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exeC:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:5028
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn sfc /tr "C:\Users\Admin\AppData\Roaming\coredpussvr\setspn.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4504
-
Network
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=2B33B361C12C66013A57A70AC0976776; domain=.bing.com; expires=Mon, 19-May-2025 02:11:41 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4770C1DFDB104E4FA31D1C1A1EC06974 Ref B: LON04EDGE0919 Ref C: 2024-04-24T02:11:40Z
date: Wed, 24 Apr 2024 02:11:40 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2B33B361C12C66013A57A70AC0976776
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=5MRysp7jlj5jaIddPRy5q5s9gcuAhgY_xX_VyGRdCYY; domain=.bing.com; expires=Mon, 19-May-2025 02:11:41 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C66842F3B31648FA8A655E38C315C809 Ref B: LON04EDGE0919 Ref C: 2024-04-24T02:11:41Z
date: Wed, 24 Apr 2024 02:11:40 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2B33B361C12C66013A57A70AC0976776; MSPTC=5MRysp7jlj5jaIddPRy5q5s9gcuAhgY_xX_VyGRdCYY
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 244DA287E94D4150A5033353BE051536 Ref B: LON04EDGE0919 Ref C: 2024-04-24T02:11:41Z
date: Wed, 24 Apr 2024 02:11:40 GMT
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request156.33.209.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request24.139.73.23.in-addr.arpaIN PTRResponse24.139.73.23.in-addr.arpaIN PTRa23-73-139-24deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request48.251.17.2.in-addr.arpaIN PTRResponse48.251.17.2.in-addr.arpaIN PTRa2-17-251-48deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 555746
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QUZE
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 705A47B256DB4E7BACFE66B8D1D5AC75 Ref B: LON04EDGE1018 Ref C: 2024-04-24T02:13:20Z
date: Wed, 24 Apr 2024 02:13:19 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
Remote address:8.8.8.8:53Requestligeon.ddns.netIN AResponse
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=tls, http22.0kB 9.2kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d2126f0600c3423dba8208f8e4478450&localId=w:E538575A-8E65-34AB-A726-A4D160CA8F07&deviceId=6966564024204374&anid=HTTP Response
204 -
1.2kB 8.1kB 15 13
-
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 15 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http24.5kB 82.7kB 73 68
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
156.33.209.4.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
24.139.73.23.in-addr.arpa
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
48.251.17.2.in-addr.arpa
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
61 B 121 B 1 1
DNS Request
ligeon.ddns.net
-
144 B 316 B 2 2
DNS Request
14.227.111.52.in-addr.arpa
DNS Request
14.227.111.52.in-addr.arpa
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
-
124 B 346 B 2 2
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
DNS Response
204.79.197.20013.107.21.200
-
146 B 212 B 2 2
DNS Request
200.197.79.204.in-addr.arpa
DNS Request
200.197.79.204.in-addr.arpa
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
-
122 B 242 B 2 2
DNS Request
ligeon.ddns.net
DNS Request
ligeon.ddns.net
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50672db2ef13237d5cb85075ff4915942
SHA1ad8b4d3eb5e40791c47d48b22e273486f25f663f
SHA2560a933408890369b5a178f9c30aa93d2c94f425650815cf8e8310de4e90a3b519
SHA51284ad10ba5b695567d33a52f786405a5544aa49d8d23631ba9edf3afa877c5dbd81570d15bcf74bce5d9fb1afad2117d0a4ef913b396c0d923afefe615619c84b
-
Filesize
2.6MB
MD5120c39a053f68266c4942ea0ae8c4386
SHA1bd7dae156d8d163a20af665935fcf572a1efd532
SHA25635e2ba0508b0218cf49a33cbd9d7272078a8732333bf550dfa135b8ace50f0c1
SHA512ac3d9a0aed1c39d8061ab410d13115cec3984d7f44c53bd892670430c64a83b5624a521dd0553460bfe4cdd743e7ab6236a6df66e6caa2729b092b197a4e337c