Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/05/2024, 17:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ZOD-master.zip
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
ZOD-master/42.zip
Resource
win11-20240419-en
General
-
Target
ZOD-master/42.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133593185059178610" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe Token: SeShutdownPrivilege 1156 chrome.exe Token: SeCreatePagefilePrivilege 1156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe 1156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1128 1156 chrome.exe 85 PID 1156 wrote to memory of 1128 1156 chrome.exe 85 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1992 1156 chrome.exe 86 PID 1156 wrote to memory of 1540 1156 chrome.exe 87 PID 1156 wrote to memory of 1540 1156 chrome.exe 87 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88 PID 1156 wrote to memory of 1840 1156 chrome.exe 88
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ZOD-master\42.zip1⤵PID:3452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca6e7cc40,0x7ffca6e7cc4c,0x7ffca6e7cc582⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3748 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4284,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,315939784430456524,14518999521679785684,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2952
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4468
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:3724
Network
-
Remote address:8.8.8.8:53Requestbrowser.pipe.aria.microsoft.comIN AResponsebrowser.pipe.aria.microsoft.comIN CNAMEbrowser.events.data.trafficmanager.netbrowser.events.data.trafficmanager.netIN CNAMEonedscolprdcus07.centralus.cloudapp.azure.comonedscolprdcus07.centralus.cloudapp.azure.comIN A52.182.143.209
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A173.222.211.130a767.dspw65.akamai.netIN A173.222.211.107
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEfp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.2be4.phicdn.netIN CNAMEfp2e7a.wpc.phicdn.netfp2e7a.wpc.phicdn.netIN A192.229.221.95
-
Remote address:8.8.8.8:53Requestr.bing.comIN AResponser.bing.comIN CNAMEp-static.bing.trafficmanager.netp-static.bing.trafficmanager.netIN CNAMEr.bing.com.edgekey.netr.bing.com.edgekey.netIN CNAMEe86303.dscx.akamaiedge.nete86303.dscx.akamaiedge.netIN A23.62.61.194e86303.dscx.akamaiedge.netIN A23.62.61.97
-
Remote address:8.8.8.8:53Request130.211.222.173.in-addr.arpaIN PTRResponse130.211.222.173.in-addr.arpaIN PTRa173-222-211-130deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request194.61.62.23.in-addr.arpaIN PTRResponse194.61.62.23.in-addr.arpaIN PTRa23-62-61-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestclientservices.googleapis.comIN AResponseclientservices.googleapis.comIN A142.250.187.195
-
Remote address:8.8.8.8:53Requestwww.gstatic.comIN AResponsewww.gstatic.comIN A142.250.180.3
-
Remote address:8.8.8.8:53Request202.212.58.216.in-addr.arpaIN PTRResponse202.212.58.216.in-addr.arpaIN PTRams16s21-in-f101e100net202.212.58.216.in-addr.arpaIN PTRams16s21-in-f202�I202.212.58.216.in-addr.arpaIN PTRlhr25s27-in-f10�I
-
Remote address:8.8.8.8:53Request238.16.217.172.in-addr.arpaIN PTRResponse238.16.217.172.in-addr.arpaIN PTRlhr48s28-in-f141e100net238.16.217.172.in-addr.arpaIN PTRmad08s04-in-f14�I
-
Remote address:8.8.8.8:53Request254.42.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.googleapis.comIN AResponsewww.googleapis.comIN A216.58.212.202www.googleapis.comIN A172.217.169.42www.googleapis.comIN A142.250.179.234www.googleapis.comIN A142.250.180.10www.googleapis.comIN A142.250.187.202www.googleapis.comIN A142.250.187.234www.googleapis.comIN A142.250.178.10www.googleapis.comIN A172.217.16.234www.googleapis.comIN A142.250.200.10www.googleapis.comIN A142.250.200.42www.googleapis.comIN A216.58.201.106www.googleapis.comIN A216.58.204.74
-
Remote address:8.8.8.8:53Requestapis.google.comIN AResponseapis.google.comIN CNAMEplus.l.google.complus.l.google.comIN A216.58.201.110
-
Remote address:8.8.8.8:53Request222.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestteams-ring.msedge.netIN AResponseteams-ring.msedge.netIN CNAMEteams-ring.teams-9999.teams-msedge.netteams-ring.teams-9999.teams-msedge.netIN CNAMEteams-9999.teams-msedge.netteams-9999.teams-msedge.netIN A52.113.196.254
-
Remote address:8.8.8.8:53Request254.240.150.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.143.182.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestfp.msedge.netIN AResponsefp.msedge.netIN CNAME1.perf.msedge.net1.perf.msedge.netIN CNAMEa-0019.a-msedge.neta-0019.a-msedge.netIN CNAMEa-0019.a.dns.azurefd.neta-0019.a.dns.azurefd.netIN CNAMEa-0019.standard.a-msedge.neta-0019.standard.a-msedge.netIN A204.79.197.222
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.178.4
-
Remote address:8.8.8.8:53Request195.187.250.142.in-addr.arpaIN PTRResponse195.187.250.142.in-addr.arpaIN PTRlhr25s33-in-f31e100net
-
Remote address:8.8.8.8:53Requestclients2.google.comIN AResponseclients2.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A172.217.16.238
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEwindowsupdatebg.s.llnwi.netwindowsupdatebg.s.llnwi.netIN A87.248.205.0
-
Remote address:8.8.8.8:53Request4.178.250.142.in-addr.arpaIN PTRResponse4.178.250.142.in-addr.arpaIN PTRlhr48s27-in-f41e100net
-
Remote address:8.8.8.8:53Requestarm-ring.msedge.netIN AResponsearm-ring.msedge.netIN CNAMEarm-ring.arm-9999.arm-msedge.netarm-ring.arm-9999.arm-msedge.netIN CNAMEarm-9999.arm-msedge.netarm-9999.arm-msedge.netIN A4.150.240.254
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.180.250.142.in-addr.arpaIN PTRResponse3.180.250.142.in-addr.arpaIN PTRlhr25s32-in-f31e100net
-
Remote address:8.8.8.8:53Requestl-ring.msedge.netIN AResponsel-ring.msedge.netIN CNAMEl-ring.l-9999.l-msedge.netl-ring.l-9999.l-msedge.netIN CNAMEl-9999.l-msedge.netl-9999.l-msedge.netIN A13.107.42.254
-
Remote address:8.8.8.8:53Request254.196.113.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request110.201.58.216.in-addr.arpaIN PTRResponse110.201.58.216.in-addr.arpaIN PTRlhr48s48-in-f141e100net110.201.58.216.in-addr.arpaIN PTRprg03s02-in-f110�I110.201.58.216.in-addr.arpaIN PTRprg03s02-in-f14�I
-
Remote address:8.8.8.8:53Requestarc.msn.comIN AResponsearc.msn.comIN CNAMEarc.trafficmanager.netarc.trafficmanager.netIN CNAMEiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comIN A20.223.36.55
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:52.113.196.254:443RequestGET /apc/trans.gif?504a71d249ec44ff05ff2515206be1a9 HTTP/2.0
host: teams-ring.msedge.net
referer: https://www.bing.com/WS/Init
accept: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
accept-language: en-US
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.17.1.21325; 10.0.0.0.22000.493) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 43
content-type: image/gif
last-modified: Tue, 26 Mar 2024 19:19:51 GMT
accept-ranges: bytes
etag: 0x0DA2C2C0C44B11E89E6C66FF4F731D7D
access-control-allow-origin: *
access-control-expose-headers: X-EndPoint, X-FrontEnd, X-UserHostAddress, X-MSEdge-Ref, X-MachineName
timing-allow-origin: *
x-content-type-options: nosniff
x-endpoint: LON21r5a
x-frontend: AFD
x-machinename: LON21EDGE0912
x-userhostaddress: 191.101.209.0
x-cache: CONFIG_NOCACHE
x-msedge-ref: Ref A: EA4E0F458D4B4A838EDFE2832F21796C Ref B: LON21EDGE0912 Ref C: 2024-05-04T17:48:27Z
date: Sat, 04 May 2024 17:48:27 GMT
-
Remote address:52.113.196.254:443RequestGET /apc/trans.gif?a1cb3d661d4464070d2d46f9f36d55bf HTTP/2.0
host: teams-ring.msedge.net
referer: https://www.bing.com/WS/Init
accept: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
accept-language: en-US
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.17.1.21325; 10.0.0.0.22000.493) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 43
content-type: image/gif
last-modified: Tue, 26 Mar 2024 19:19:51 GMT
accept-ranges: bytes
etag: 0x0DA2C2C0C44B11E89E6C66FF4F731D7D
access-control-allow-origin: *
access-control-expose-headers: X-EndPoint, X-FrontEnd, X-UserHostAddress, X-MSEdge-Ref, X-MachineName
timing-allow-origin: *
x-content-type-options: nosniff
x-endpoint: LON21r5a
x-frontend: AFD
x-machinename: LON21EDGE0912
x-userhostaddress: 191.101.209.0
x-cache: CONFIG_NOCACHE
x-msedge-ref: Ref A: 6613B599ABEB4336921A6F92AC292CC7 Ref B: LON21EDGE0912 Ref C: 2024-05-04T17:48:27Z
date: Sat, 04 May 2024 17:48:27 GMT
-
22.4kB 142.5kB 138 119
-
1.1kB 5.2kB 15 12
-
3.3kB 7.5kB 20 14
-
1.1kB 5.2kB 15 12
-
67.3kB 1.8MB 1338 1295
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
1.1kB 5.2kB 15 12
-
988 B 4.8kB 7 8
-
953 B 8.3kB 8 9
-
52.113.196.254:443https://teams-ring.msedge.net/apc/trans.gif?a1cb3d661d4464070d2d46f9f36d55bftls, http21.9kB 8.2kB 20 18
HTTP Request
GET https://teams-ring.msedge.net/apc/trans.gif?504a71d249ec44ff05ff2515206be1a9HTTP Response
200HTTP Request
GET https://teams-ring.msedge.net/apc/trans.gif?a1cb3d661d4464070d2d46f9f36d55bfHTTP Response
200 -
98 B 52 B 2 1
-
764 B 1.8kB 11 11
DNS Request
browser.pipe.aria.microsoft.com
DNS Response
52.182.143.209
DNS Request
ctldl.windowsupdate.com
DNS Response
173.222.211.130173.222.211.107
DNS Request
ocsp.digicert.com
DNS Response
192.229.221.95
DNS Request
r.bing.com
DNS Response
23.62.61.19423.62.61.97
DNS Request
130.211.222.173.in-addr.arpa
DNS Request
194.61.62.23.in-addr.arpa
DNS Request
clientservices.googleapis.com
DNS Response
142.250.187.195
DNS Request
www.gstatic.com
DNS Response
142.250.180.3
DNS Request
202.212.58.216.in-addr.arpa
DNS Request
238.16.217.172.in-addr.arpa
DNS Request
254.42.107.13.in-addr.arpa
-
476 B 1.0kB 7 7
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
www.googleapis.com
DNS Response
216.58.212.202172.217.169.42142.250.179.234142.250.180.10142.250.187.202142.250.187.234142.250.178.10172.217.16.234142.250.200.10142.250.200.42216.58.201.106216.58.204.74
DNS Request
apis.google.com
DNS Response
216.58.201.110
DNS Request
222.197.79.204.in-addr.arpa
DNS Request
teams-ring.msedge.net
DNS Response
52.113.196.254
DNS Request
254.240.150.4.in-addr.arpa
-
400 B 852 B 6 6
DNS Request
209.143.182.52.in-addr.arpa
DNS Request
fp.msedge.net
DNS Response
204.79.197.222
DNS Request
www.google.com
DNS Response
142.250.178.4
DNS Request
195.187.250.142.in-addr.arpa
DNS Request
clients2.google.com
DNS Response
172.217.16.238
DNS Request
ctldl.windowsupdate.com
DNS Response
87.248.205.0
-
3.9kB 46.7kB 34 50
-
4.6kB 51.0kB 27 44
-
208 B 405 B 3 3
DNS Request
4.178.250.142.in-addr.arpa
DNS Request
arm-ring.msedge.net
DNS Response
4.150.240.254
DNS Request
55.36.223.20.in-addr.arpa
-
208 B 399 B 3 3
DNS Request
3.180.250.142.in-addr.arpa
DNS Request
l-ring.msedge.net
DNS Response
13.107.42.254
DNS Request
254.196.113.52.in-addr.arpa
-
201 B 466 B 3 3
DNS Request
110.201.58.216.in-addr.arpa
DNS Request
arc.msn.com
DNS Response
20.223.36.55
DNS Request
0.205.248.87.in-addr.arpa
-
2.5kB 8.2kB 11 12
-
204 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5421a4e155cbeb65e805e6fbcf949e5a1
SHA1490ad079550fac09620b7e0b1c88a3f9b1c80a99
SHA256d79ad3dd5ad18ef128f716333dfc21c68c8148aaf820f1bcb03b3b0c0b5ea4ac
SHA5120f2bdf5dcfcfa0b5bde7ed196dfde6ea89be01fa87b875565e87d199df7d7ecb985880761452725aca77b2a73bcdf73bc296ea0cba766a633be5b6f724c708de
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
352B
MD586d962aa79b76fd8ed0ed0d5b5146acf
SHA1ee5dbee80c7de1adbeec33afda8830e40ee1e029
SHA256a8fd096e191f93a3993f9e40844802fc0433862bb77714928e4de259f0ac2dca
SHA51292b448305a912b0488755966b26245924d345180e08369c7fba13f2f70c68516fa65167cb762beca5889c864773c4cae0933b1b11ded44373d9b53a810fff755
-
Filesize
8KB
MD599b426bc9474abdab12b48687046f459
SHA186f736476e820b90bac6227d212629c08142d9e3
SHA256680b68d1f1d227354707e1195f1fe676d591a9ed0e4e0b71d7cea50b35f63c4e
SHA512abd0e705ce4979fa94857c75837d3e221587e3923a013a50fcd2086430a248fff2001aa6e1da6936bbad9a71e1e65e0c86ddaaeac1414082da7b1184421842ef
-
Filesize
15KB
MD58ac85cf60ac6e3b7675374ca286e613b
SHA18b5b06a51455dfd53e3fba69472cf9f78b288926
SHA256ebcbbe21d1df64728a0af0306cbbfd2bc2678eca64cc0f1cbfa2b2cd3226927d
SHA512043e12f4c90c465c26b578f6c4e62ae6f7ba8ae016984ca26fe848d9a17df145d2ba4e72b0c73dbe55e456e89faf9f8cff49f227c961ae45ef9931c37123d12f
-
Filesize
152KB
MD5c7b6bd552cffbe7f3e15d10a93de6d53
SHA176d8c8177aa5e25274e14281ee36166994849a29
SHA256be7a81d4be08f77ef5c2697bfe568d40cbdd419fa151d5ef20ff40165641499e
SHA512d702f2ace97f1d90f8cf1e90e15a11b3e5f6edbb58d2a9886f012468f3c3a7c1a31d11c0379396952187fd9779113da3e02cf4cf9b0e11b006a3196051c97115