Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 10:07 UTC

General

  • Target

    5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe

  • Size

    514KB

  • MD5

    32ab0711c74737a7d5948b73ccc1ab6f

  • SHA1

    3bd68e686a0260a11aa4805a2655867c4e780059

  • SHA256

    5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1

  • SHA512

    2aebec7ee681bd7e5e085571347a9caed38c2dfd5c705ee5fdb23da1258079bfb77b278427dd46811afc7f2f98afa2c818abb44e305cc13d4e43c8d1dec0a7e3

  • SSDEEP

    12288:8Mrzy906i3DhgK5RE1g0xJF7ceeeeDC37Ztoj8QXII:HysNDSF7we97Zc

Malware Config

Extracted

Family

amadey

Version

3.85

C2

http://77.91.68.3

Attributes
  • install_dir

    3ec1f323b5

  • install_file

    danke.exe

  • strings_key

    827021be90f1e85ab27949ea7e9347e8

  • url_paths

    /home/love/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

redline

Botnet

nasa

C2

77.91.68.68:19071

Attributes
  • auth_value

    6da71218d8a9738ea3a9a78b5677589b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe
    "C:\Users\Admin\AppData\Local\Temp\5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804047.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804047.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1593511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1593511.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0423755.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0423755.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3882292.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3882292.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
            "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:8
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4540
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4076
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "danke.exe" /P "Admin:N"
                  7⤵
                    PID:4888
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "danke.exe" /P "Admin:R" /E
                    7⤵
                      PID:4924
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:460
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\3ec1f323b5" /P "Admin:N"
                        7⤵
                          PID:2744
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\3ec1f323b5" /P "Admin:R" /E
                          7⤵
                            PID:3748
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0749332.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0749332.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:4580
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6820135.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6820135.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3392
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:2980
              • C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe
                1⤵
                • Executes dropped EXE
                PID:4440

              Network

              • flag-us
                DNS
                g.bing.com
                Remote address:
                8.8.8.8:53
                Request
                g.bing.com
                IN A
                Response
                g.bing.com
                IN CNAME
                g-bing-com.dual-a-0034.a-msedge.net
                g-bing-com.dual-a-0034.a-msedge.net
                IN CNAME
                dual-a-0034.a-msedge.net
                dual-a-0034.a-msedge.net
                IN A
                204.79.197.237
                dual-a-0034.a-msedge.net
                IN A
                13.107.21.237
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; domain=.bing.com; expires=Tue, 03-Jun-2025 10:08:29 GMT; path=/; SameSite=None; Secure; Priority=High;
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 8F69FFB622F04CAEA9A0996ACD0C0A12 Ref B: LON04EDGE1016 Ref C: 2024-05-09T10:08:29Z
                date: Thu, 09 May 2024 10:08:28 GMT
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MSPTC=wAyu0YBfDI-h8SDMA8mskdzgQAGFzrlqxQ7RckXgejc; domain=.bing.com; expires=Tue, 03-Jun-2025 10:08:30 GMT; path=/; Partitioned; secure; SameSite=None
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: EBCDC83CCA9045FFA57EA07529864840 Ref B: LON04EDGE1016 Ref C: 2024-05-09T10:08:30Z
                date: Thu, 09 May 2024 10:08:29 GMT
              • flag-us
                DNS
                154.239.44.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                154.239.44.20.in-addr.arpa
                IN PTR
                Response
              • flag-be
                GET
                https://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893
                Remote address:
                2.17.196.65:443
                Request
                GET /aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893 HTTP/2.0
                host: www.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F
                Response
                HTTP/2.0 200
                cache-control: private,no-store
                pragma: no-cache
                vary: Origin
                p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 1DC78E47497D41C28E464DCC4C260250 Ref B: DUS30EDGE0310 Ref C: 2024-05-09T10:08:29Z
                content-length: 0
                date: Thu, 09 May 2024 10:08:29 GMT
                set-cookie: _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63; path=/; httponly; domain=bing.com
                set-cookie: MUIDB=0BFBDABE58C666BF1E71CEC45926674F; path=/; httponly; expires=Tue, 03-Jun-2025 10:08:29 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.3dc41102.1715249309.25a50b8
              • flag-us
                DNS
                237.197.79.204.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                237.197.79.204.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                79.190.18.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                79.190.18.2.in-addr.arpa
                IN PTR
                Response
                79.190.18.2.in-addr.arpa
                IN PTR
                a2-18-190-79deploystaticakamaitechnologiescom
              • flag-us
                DNS
                95.221.229.192.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                95.221.229.192.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                65.196.17.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                65.196.17.2.in-addr.arpa
                IN PTR
                Response
                65.196.17.2.in-addr.arpa
                IN PTR
                a2-17-196-65deploystaticakamaitechnologiescom
              • flag-be
                GET
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                Remote address:
                2.17.196.65:443
                Request
                GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
                host: www.bing.com
                accept: */*
                cookie: MUID=0BFBDABE58C666BF1E71CEC45926674F; _EDGE_S=SID=10ACDEA574156F3028C8CADF75D56E63; MSPTC=wAyu0YBfDI-h8SDMA8mskdzgQAGFzrlqxQ7RckXgejc; MUIDB=0BFBDABE58C666BF1E71CEC45926674F
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-type: image/png
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                content-length: 1107
                date: Thu, 09 May 2024 10:08:31 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.3dc41102.1715249311.25a5c06
              • flag-us
                DNS
                205.47.74.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                205.47.74.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                77.190.18.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                77.190.18.2.in-addr.arpa
                IN PTR
                Response
                77.190.18.2.in-addr.arpa
                IN PTR
                a2-18-190-77deploystaticakamaitechnologiescom
              • flag-us
                DNS
                55.36.223.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                55.36.223.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                149.220.183.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                149.220.183.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                31.243.111.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                31.243.111.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                tse1.mm.bing.net
                Remote address:
                8.8.8.8:53
                Request
                tse1.mm.bing.net
                IN A
                Response
                tse1.mm.bing.net
                IN CNAME
                mm-mm.bing.net.trafficmanager.net
                mm-mm.bing.net.trafficmanager.net
                IN CNAME
                dual-a-0001.a-msedge.net
                dual-a-0001.a-msedge.net
                IN A
                204.79.197.200
                dual-a-0001.a-msedge.net
                IN A
                13.107.21.200
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 638730
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: C12C9101BCDD42A0A652E6A7DA8CC8C9 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
                date: Thu, 09 May 2024 10:10:08 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 555746
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 2E14B55AB230427F9A871F11E72ABDF9 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
                date: Thu, 09 May 2024 10:10:08 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 496166
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 31897DAE8A9D418FAD5545A2A8C28B85 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
                date: Thu, 09 May 2024 10:10:08 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 496229
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 885A572319BC4E8EB9CD5F77119E8424 Ref B: LON04EDGE1022 Ref C: 2024-05-09T10:10:09Z
                date: Thu, 09 May 2024 10:10:08 GMT
              • flag-us
                DNS
                200.197.79.204.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                200.197.79.204.in-addr.arpa
                IN PTR
                Response
                200.197.79.204.in-addr.arpa
                IN PTR
                a-0001a-msedgenet
              • 204.79.197.237:443
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E
                tls, http2
                2.5kB
                9.0kB
                19
                16

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E

                HTTP Response

                204

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De89a-zHReowGSQCh5XdL7uJzVUCUySYt2xlbdbw5z-wPCd_hRsKnu46KYdE2tRlom6KcX7NTh3SYfFLCXFeKikk7n9cwuRjeYpJjJcm_NLIYTat-En4npHYEIH1XPf1oGAKJ1YoBqxSAPn6Uu2XGsP-gk-oFEegcZIj-3ZQ7VzZHwL8mGR%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D4392b8d149b11b74e7cadefafaa51733&TIME=20240426T135914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893&muid=465F5D2AB0629966D2D4950980DD8E0E

                HTTP Response

                204
              • 2.17.196.65:443
                https://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893
                tls, http2
                1.7kB
                5.4kB
                18
                12

                HTTP Request

                GET https://www.bing.com/aes/c.gif?RG=9ff339fc70c74a308a1cc10aabfdc949&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T135914Z&adUnitId=11730597&localId=w:465F5D2A-B062-9966-D2D4-950980DD8E0E&deviceId=6966564702272893

                HTTP Response

                200
              • 2.17.196.65:443
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                tls, http2
                1.6kB
                6.4kB
                17
                12

                HTTP Request

                GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

                HTTP Response

                200
              • 77.91.68.3:80
                danke.exe
                260 B
                5
              • 77.91.68.68:19071
                d6820135.exe
                260 B
                5
              • 77.91.68.68:19071
                d6820135.exe
                260 B
                5
              • 77.91.68.3:80
                danke.exe
                260 B
                5
              • 77.91.68.68:19071
                d6820135.exe
                260 B
                5
              • 77.91.68.3:80
                danke.exe
                260 B
                5
              • 77.91.68.68:19071
                d6820135.exe
                260 B
                5
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                tls, http2
                79.6kB
                2.3MB
                1662
                1659

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239340783933_1QOIM48UV8MGOV4SU&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239351691769_17S178H4I11J3APXJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239351691770_1IUJHOACLFVRNOEKH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239340783932_1JCHO8JLBZ4TPAX49&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 77.91.68.3:80
                danke.exe
                260 B
                5
              • 77.91.68.68:19071
                d6820135.exe
                260 B
                5
              • 77.91.68.3:80
                danke.exe
                208 B
                4
              • 77.91.68.68:19071
                d6820135.exe
                208 B
                4
              • 8.8.8.8:53
                g.bing.com
                dns
                56 B
                151 B
                1
                1

                DNS Request

                g.bing.com

                DNS Response

                204.79.197.237
                13.107.21.237

              • 8.8.8.8:53
                154.239.44.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                154.239.44.20.in-addr.arpa

              • 8.8.8.8:53
                237.197.79.204.in-addr.arpa
                dns
                73 B
                143 B
                1
                1

                DNS Request

                237.197.79.204.in-addr.arpa

              • 8.8.8.8:53
                79.190.18.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                79.190.18.2.in-addr.arpa

              • 8.8.8.8:53
                95.221.229.192.in-addr.arpa
                dns
                73 B
                144 B
                1
                1

                DNS Request

                95.221.229.192.in-addr.arpa

              • 8.8.8.8:53
                65.196.17.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                65.196.17.2.in-addr.arpa

              • 8.8.8.8:53
                205.47.74.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                205.47.74.20.in-addr.arpa

              • 8.8.8.8:53
                77.190.18.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                77.190.18.2.in-addr.arpa

              • 8.8.8.8:53
                55.36.223.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                55.36.223.20.in-addr.arpa

              • 8.8.8.8:53
                149.220.183.52.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                149.220.183.52.in-addr.arpa

              • 8.8.8.8:53
                31.243.111.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                31.243.111.52.in-addr.arpa

              • 8.8.8.8:53
                tse1.mm.bing.net
                dns
                62 B
                173 B
                1
                1

                DNS Request

                tse1.mm.bing.net

                DNS Response

                204.79.197.200
                13.107.21.200

              • 8.8.8.8:53
                200.197.79.204.in-addr.arpa
                dns
                73 B
                106 B
                1
                1

                DNS Request

                200.197.79.204.in-addr.arpa

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6820135.exe

                Filesize

                172KB

                MD5

                35c069df2551d2e840fda156cc641cc6

                SHA1

                3d585c42d1263b19654dbbb2116c6e1634748f45

                SHA256

                6f0c4d8a21e15d15d6f6bc50e37e67a0e9217cc8601de1c084e16a35a82f3042

                SHA512

                55bb9bc855872a4c51033e0343f78e3dd7c998bc46a704c9cff631e9bb27a117eaff3a2005a35e836d8c66d89372441c2b233778ff3dfbaa7edbaaa1f28b0619

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804047.exe

                Filesize

                359KB

                MD5

                f96731ad89768ce38ca85155833675d0

                SHA1

                c5d8a91c287100b4fe000328e838a442380efed0

                SHA256

                7441d0da025a83eb86b2311e1d4eba38dabcdc4d77ba48942bd0b8318e1cd4a0

                SHA512

                0d2e17273a0222b9779ad33af67c33dc98e6a1917e5926ab5c44daa037698f169d1645380f46300d028303a9692d894210ae9b5c04e720fd535768c314e70c45

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0749332.exe

                Filesize

                32KB

                MD5

                ff0df20aebaf00c240e35f3c6b3957ec

                SHA1

                651f9c7a07b9f8b960e7ded63930e6e28b82b3f8

                SHA256

                0397e50962c0459763242b1b1334a5e3fb923f693fbeb47a5a837ede9ab207bb

                SHA512

                70de52de0f30a327b22d0d9a1d081369f1fc50cefc9b00d1c70c6919271e878b5d7d2d2fe824e81f418e7454c531956d875149827f31d8f4aeca779f2e485afa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1593511.exe

                Filesize

                235KB

                MD5

                f022d704d6a78d750895a61fa69ac1c0

                SHA1

                1cd6a0036b9b623372a3cc265cf498bdb6a992a8

                SHA256

                c9aa8e6cc76da1ba13bb15864e57ccce2ea5f191245f3289a15a6df22a4f6c77

                SHA512

                c228a1db499b7eaea173da79b87b95ba3d06664958d8e03ac6f95379732c22ccca25557c1247e2ae0d915fad34ee08103d8d7d0dee14edea331074348474d646

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0423755.exe

                Filesize

                14KB

                MD5

                db00354a2702c30e10247ec3409494ed

                SHA1

                e08194ec9f17cbc43f2fba1462feed2f89dd1550

                SHA256

                dfd3e39fdb8c41e7b58bc6138a3773186bfc0bb2b65c555e66292603f032acd5

                SHA512

                78af980cad7b2af08d261f42e2ed7191556f5c66de16246db82cee4391af644018a9ea8efe33ca390821b09c00ff9e150dc9bccfeb70991b0dba1cb72d38b511

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3882292.exe

                Filesize

                226KB

                MD5

                1559c7c688a29ee1fbc80447c10bb7d7

                SHA1

                770fd8c753c5f5bca3001a6a5d132504f29bbcd7

                SHA256

                bf50960f0a97170ac60526811496d5f47fb73e6d94962a4d624fdaa5669ed645

                SHA512

                cdbb1dea45137051c156e05d698c018e5253f3ca48f4c9d637948594180431c33fc08f879549fd1a8f1fa38837c2cca4b540c15f2701cafb9284bf31c88f6e94

              • memory/2600-21-0x0000000000AD0000-0x0000000000ADA000-memory.dmp

                Filesize

                40KB

              • memory/2600-22-0x00007FFA94B93000-0x00007FFA94B95000-memory.dmp

                Filesize

                8KB

              • memory/3392-47-0x0000000005D00000-0x0000000006318000-memory.dmp

                Filesize

                6.1MB

              • memory/3392-45-0x0000000000D20000-0x0000000000D50000-memory.dmp

                Filesize

                192KB

              • memory/3392-46-0x0000000005500000-0x0000000005506000-memory.dmp

                Filesize

                24KB

              • memory/3392-48-0x00000000057F0000-0x00000000058FA000-memory.dmp

                Filesize

                1.0MB

              • memory/3392-49-0x00000000055A0000-0x00000000055B2000-memory.dmp

                Filesize

                72KB

              • memory/3392-50-0x0000000005720000-0x000000000575C000-memory.dmp

                Filesize

                240KB

              • memory/3392-51-0x0000000005760000-0x00000000057AC000-memory.dmp

                Filesize

                304KB

              • memory/4580-41-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4580-39-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.