Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 13:00 UTC
Static task
static1
Behavioral task
behavioral1
Sample
c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe
Resource
win10v2004-20240508-en
General
-
Target
c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe
-
Size
382KB
-
MD5
278218d2ac13d2d7134e6e9a0828e4d5
-
SHA1
05066b895c41396d0321bc3a032f2f7c2e1811e3
-
SHA256
c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0
-
SHA512
f1e41a457c01a6ad0ac00e3a004023429d644b1a9bb193afd277f333f1bd4bd00059e37c6df2565b9c7e8bda3cbe3f713b2d39d04ca0c5ad169788efdb230b7d
-
SSDEEP
6144:1jNHmrGVx/2m1f+eo864r+m4fSw3Axa3Uet46nBeJKts:1jNGexJo8raXfS8Axa35t46nUJKts
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/3064-71-0x0000020828E20000-0x000002082C654000-memory.dmp family_zgrat_v1 behavioral1/memory/3064-72-0x0000020849540000-0x000002084964A000-memory.dmp family_zgrat_v1 behavioral1/memory/3064-76-0x000002082E440000-0x000002082E464000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation uic.1.exe -
Executes dropped EXE 2 IoCs
pid Process 1652 uic.0.exe 2488 uic.1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3444 660 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uic.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uic.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uic.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString uic.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uic.0.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1652 uic.0.exe 1652 uic.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3064 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe 2488 uic.1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 660 wrote to memory of 1652 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 96 PID 660 wrote to memory of 1652 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 96 PID 660 wrote to memory of 1652 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 96 PID 660 wrote to memory of 2488 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 98 PID 660 wrote to memory of 2488 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 98 PID 660 wrote to memory of 2488 660 c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe 98 PID 2488 wrote to memory of 3064 2488 uic.1.exe 106 PID 2488 wrote to memory of 3064 2488 uic.1.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe"C:\Users\Admin\AppData\Local\Temp\c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\uic.0.exe"C:\Users\Admin\AppData\Local\Temp\uic.0.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\uic.1.exe"C:\Users\Admin\AppData\Local\Temp\uic.1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 11522⤵
- Program crash
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:81⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 660 -ip 6601⤵PID:3472
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request67.31.126.40.in-addr.arpaIN PTRResponse
-
GEThttps://www.bing.com/th?id=OADD2.10239368184744_14DPBWVU0KKOKDZ8E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90Remote address:88.221.83.187:443RequestGET /th?id=OADD2.10239368184744_14DPBWVU0KKOKDZ8E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 5773
date: Thu, 09 May 2024 13:00:17 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.b753dd58.1715259617.9072662
-
Remote address:8.8.8.8:53Request187.83.221.88.in-addr.arpaIN PTRResponse187.83.221.88.in-addr.arpaIN PTRa88-221-83-187deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
GEThttp://185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=0c697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exeRemote address:185.172.128.90:80RequestGET /cpa/ping.php?substr=one&s=ab&sub=0 HTTP/1.1
Host: 185.172.128.90
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.129 Safari/537.36
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.52 (Ubuntu)
Content-Length: 1
Content-Type: text/html; charset=UTF-8
-
GEThttp://185.172.128.228/ping.php?substr=onec697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exeRemote address:185.172.128.228:80RequestGET /ping.php?substr=one HTTP/1.1
Host: 185.172.128.228
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.129 Safari/537.36
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.52 (Ubuntu)
Content-Length: 0
Content-Type: text/html; charset=UTF-8
-
GEThttp://185.172.128.59/syncUpd.exec697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exeRemote address:185.172.128.59:80RequestGET /syncUpd.exe HTTP/1.1
Host: 185.172.128.59
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.129 Safari/537.36
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.52 (Ubuntu)
Last-Modified: Thu, 09 May 2024 13:00:01 GMT
ETag: "36800-61804ff3cf00a"
Accept-Ranges: bytes
Content-Length: 223232
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request228.128.172.185.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.128.172.185.in-addr.arpaIN PTRResponse
-
GEThttp://185.172.128.228/BroomSetup.exec697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exeRemote address:185.172.128.228:80RequestGET /BroomSetup.exe HTTP/1.1
Host: 185.172.128.228
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.129 Safari/537.36
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.52 (Ubuntu)
Last-Modified: Fri, 15 Mar 2024 11:59:56 GMT
ETag: "4a4030-613b1bf118700"
Accept-Ranges: bytes
Content-Length: 4866096
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request59.128.172.185.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.172.185.in-addr.arpaIN PTR
-
Remote address:185.172.128.150:80RequestPOST /c698e1bc8a2f5e6d.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----FHJKKECFIECAKECAFBGC
Host: 185.172.128.150
Content-Length: 217
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Request150.128.172.185.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestsvc.iolo.comIN AResponsesvc.iolo.comIN A20.157.87.45
-
Remote address:20.157.87.45:80RequestPOST /__svc/sbv/DownloadManager.ashx HTTP/1.0
Connection: keep-alive
Content-Length: 300
Host: svc.iolo.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: identity
User-Agent: Mozilla/3.0 (compatible; Indy Library)
ResponseHTTP/1.1 200 OK
content-length: 256
content-type: text/html; charset=utf-8
x-whom: Ioloweb5
date: Thu, 09 May 2024 13:00:35 GMT
set-cookie: SERVERID=svc5; path=/
connection: close
-
Remote address:8.8.8.8:53Request45.87.157.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdownload.iolo.netIN AResponsedownload.iolo.netIN CNAMEiolo0.b-cdn.netiolo0.b-cdn.netIN A185.93.2.251
-
HEADhttps://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exeRemote address:185.93.2.251:443RequestHEAD /sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exe HTTP/2.0
host: download.iolo.net
accept: */*
accept-encoding: identity
user-agent: Microsoft BITS/7.8
ResponseHTTP/2.0 200
content-type: application/octet-stream
content-length: 58919336
server: BunnyCDN-FR1-1186
cdn-pullzone: 1654350
cdn-uid: 5b8ea5d8-68d6-4057-a57d-a5f315142028
cdn-requestcountrycode: GB
cache-control: public, max-age=259200
last-modified: Mon, 29 Apr 2024 18:38:19 GMT
cdn-storageserver: DE-664
cdn-fileserver: 594
cdn-proxyver: 1.04
cdn-requestpullsuccess: True
cdn-requestpullcode: 206
cdn-cachedat: 05/06/2024 22:02:11
cdn-edgestorageid: 1187
cdn-status: 200
cdn-requestid: bec26d6a580ac0fcc34ddda9681d3aef
cdn-cache: HIT
accept-ranges: bytes
-
GEThttps://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exeRemote address:185.93.2.251:443RequestGET /sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exe HTTP/2.0
host: download.iolo.net
accept: */*
accept-encoding: identity
if-unmodified-since: Mon, 29 Apr 2024 18:38:19 GMT
user-agent: Microsoft BITS/7.8
ResponseHTTP/2.0 200
content-type: application/octet-stream
content-length: 58919336
server: BunnyCDN-FR1-1186
cdn-pullzone: 1654350
cdn-uid: 5b8ea5d8-68d6-4057-a57d-a5f315142028
cdn-requestcountrycode: GB
cache-control: public, max-age=259200
last-modified: Mon, 29 Apr 2024 18:38:19 GMT
cdn-storageserver: DE-664
cdn-fileserver: 594
cdn-proxyver: 1.04
cdn-requestpullsuccess: True
cdn-requestpullcode: 206
cdn-cachedat: 05/06/2024 22:02:11
cdn-edgestorageid: 1187
cdn-status: 200
cdn-requestid: bb2a89e501d9e3c182f5a214b44de9db
cdn-cache: HIT
accept-ranges: bytes
-
Remote address:8.8.8.8:53Request251.2.93.185.in-addr.arpaIN PTRResponse251.2.93.185.in-addr.arpaIN PTR185-93-2-251 bunnyinfranet
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTR
-
Remote address:20.157.87.45:80RequestPOST /__svc/sbv/DownloadManager.ashx HTTP/1.0
Connection: keep-alive
Content-Length: 300
Host: svc.iolo.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: identity
User-Agent: Mozilla/3.0 (compatible; Indy Library)
ResponseHTTP/1.1 200 OK
content-length: 192
content-type: text/html; charset=utf-8
x-whom: Ioloweb7
date: Thu, 09 May 2024 13:00:48 GMT
set-cookie: SERVERID=svc7; path=/
connection: close
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.15.31.184.in-addr.arpaIN PTRResponse57.15.31.184.in-addr.arpaIN PTRa184-31-15-57deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request57.15.31.184.in-addr.arpaIN PTR
-
DNSwestus2-2.in.applicationinsights.azure.comSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeRemote address:8.8.8.8:53Requestwestus2-2.in.applicationinsights.azure.comIN AResponsewestus2-2.in.applicationinsights.azure.comIN CNAMEwestus2-2.in.ai.monitor.azure.comwestus2-2.in.ai.monitor.azure.comIN CNAMEwestus2-2.in.ai.privatelink.monitor.azure.comwestus2-2.in.ai.privatelink.monitor.azure.comIN CNAMEgig-ai-prod-westus2-0.trafficmanager.netgig-ai-prod-westus2-0.trafficmanager.netIN CNAMEgig-ai-prod-wus2-0-app-v4-tag.westus2.cloudapp.azure.comgig-ai-prod-wus2-0-app-v4-tag.westus2.cloudapp.azure.comIN A20.9.155.145
-
POSThttps://westus2-2.in.applicationinsights.azure.com/v2/trackSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeRemote address:20.9.155.145:443RequestPOST /v2/track HTTP/1.1
Content-Type: application/x-json-stream
Content-Encoding: gzip
Host: westus2-2.in.applicationinsights.azure.com
Content-Length: 846
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Server: Microsoft-HTTPAPI/2.0
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
Date: Thu, 09 May 2024 13:00:56 GMT
-
Remote address:8.8.8.8:53Request145.155.9.20.in-addr.arpaIN PTRResponse
-
Remote address:185.172.128.150:80RequestPOST /c698e1bc8a2f5e6d.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----HJEBGHIEBFIJKECBKFHD
Host: 185.172.128.150
Content-Length: 196
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:185.172.128.150:80RequestPOST /c698e1bc8a2f5e6d.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----JJKJDAEBFCBKECBGDBFC
Host: 185.172.128.150
Content-Length: 195
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:8.8.8.8:53Request195.201.50.20.in-addr.arpaIN PTRResponse
-
Remote address:185.172.128.150:80RequestPOST /c698e1bc8a2f5e6d.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----HIDGCFBFBFBKEBGCAFCG
Host: 185.172.128.150
Content-Length: 4751
Connection: Keep-Alive
Cache-Control: no-cache
-
Remote address:185.172.128.150:80RequestGET /b7d0cfdb1d966bdd/sqlite3.dll HTTP/1.1
Host: 185.172.128.150
Cache-Control: no-cache
-
88.221.83.187:443https://www.bing.com/th?id=OADD2.10239368184744_14DPBWVU0KKOKDZ8E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90tls, http21.7kB 11.6kB 22 16
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239368184744_14DPBWVU0KKOKDZ8E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90HTTP Response
200 -
185.172.128.90:80http://185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=0httpc697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe440 B 280 B 5 3
HTTP Request
GET http://185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=0HTTP Response
200 -
185.172.128.228:80http://185.172.128.228/ping.php?substr=onehttpc697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe374 B 279 B 4 3
HTTP Request
GET http://185.172.128.228/ping.php?substr=oneHTTP Response
200 -
185.172.128.59:80http://185.172.128.59/syncUpd.exehttpc697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe6.2kB 230.5kB 123 174
HTTP Request
GET http://185.172.128.59/syncUpd.exeHTTP Response
200 -
185.172.128.228:80http://185.172.128.228/BroomSetup.exehttpc697ba11d34c3fcce2efe3d2699c68c933f986b36ccb6b9fb0e9c08fcbcfa7e0.exe106.7kB 5.0MB 2189 3755
HTTP Request
GET http://185.172.128.228/BroomSetup.exeHTTP Response
200 -
603 B 92 B 4 2
HTTP Request
POST http://185.172.128.150/c698e1bc8a2f5e6d.php -
836 B 721 B 6 6
HTTP Request
POST http://svc.iolo.com/__svc/sbv/DownloadManager.ashxHTTP Response
200 -
185.93.2.251:443https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exetls, http22.3MB 61.5MB 39544 44241
HTTP Request
HEAD https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exeHTTP Response
200HTTP Request
GET https://download.iolo.net/sm/24/11A12794-499E-4FA0-A281-A9A9AA8B2685/24.3.1.11/SystemMechanic.exeHTTP Response
200 -
836 B 657 B 6 6
HTTP Request
POST http://svc.iolo.com/__svc/sbv/DownloadManager.ashxHTTP Response
200 -
20.9.155.145:443https://westus2-2.in.applicationinsights.azure.com/v2/tracktls, httpSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe2.0kB 5.2kB 11 10
HTTP Request
POST https://westus2-2.in.applicationinsights.azure.com/v2/trackHTTP Response
200 -
582 B 92 B 4 2
HTTP Request
POST http://185.172.128.150/c698e1bc8a2f5e6d.php -
581 B 92 B 4 2
HTTP Request
POST http://185.172.128.150/c698e1bc8a2f5e6d.php -
5.3kB 212 B 8 5
HTTP Request
POST http://185.172.128.150/c698e1bc8a2f5e6d.php -
232 B 92 B 3 2
HTTP Request
GET http://185.172.128.150/b7d0cfdb1d966bdd/sqlite3.dll
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
67.31.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
187.83.221.88.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
57.169.31.20.in-addr.arpa
-
74 B 74 B 1 1
DNS Request
228.128.172.185.in-addr.arpa
-
73 B 73 B 1 1
DNS Request
90.128.172.185.in-addr.arpa
-
146 B 73 B 2 1
DNS Request
59.128.172.185.in-addr.arpa
DNS Request
59.128.172.185.in-addr.arpa
-
74 B 74 B 1 1
DNS Request
150.128.172.185.in-addr.arpa
-
58 B 74 B 1 1
DNS Request
svc.iolo.com
DNS Response
20.157.87.45
-
71 B 157 B 1 1
DNS Request
45.87.157.20.in-addr.arpa
-
63 B 105 B 1 1
DNS Request
download.iolo.net
DNS Response
185.93.2.251
-
71 B 112 B 1 1
DNS Request
251.2.93.185.in-addr.arpa
-
140 B 144 B 2 1
DNS Request
86.23.85.13.in-addr.arpa
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
142 B 135 B 2 1
DNS Request
57.15.31.184.in-addr.arpa
DNS Request
57.15.31.184.in-addr.arpa
-
8.8.8.8:53westus2-2.in.applicationinsights.azure.comdnsSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe88 B 299 B 1 1
DNS Request
westus2-2.in.applicationinsights.azure.com
DNS Response
20.9.155.145
-
71 B 157 B 1 1
DNS Request
145.155.9.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
195.201.50.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b85afc26624a5872fb92ec370db76c6
SHA1865c38761276c01268299800d6aeb265162b6338
SHA2562cb28246ab7021a51820b324ee0e6a89f7db885e380c13d70c9d3cc92161f876
SHA512862f07dba6ed0d8202200b5e36c3b5167e0fc437a93c8feecc8d695dfa1e145df0e48add286914236bc724556e20282700b56dbb5c94c7c2f165a5991a9c0faf
-
Filesize
218KB
MD55246be38e251c182f838adf4ef42ad40
SHA1fe09ba5ee40d4c4897c8f8e3fa819c13b0e324d9
SHA2567dbf762b2ef2b651a4e8c7b7d9b8996a1de0cfa44119452f1d3f29bfe03dfd86
SHA512a3f7c75a2355935d19c733d67aeff3e08f382ae60c1ba45364974ff91ca779ac5e49c40475fe35b8923a130e8670de0311fdf3c03de935312869e9a9a8b21b14
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954