Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 13:21 UTC

General

  • Target

    05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729.exe

  • Size

    515KB

  • MD5

    311bcc98621f1612a7a0bae8b412dd21

  • SHA1

    e6208f01069780dfb69fc831895e3b97cd900842

  • SHA256

    05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729

  • SHA512

    84aaeae41c97293674a99209e67e09ee915f6c533ef735792493981f7ce8cb6e66b69fa403c6d7fb9a0b9d8041af71484affe045c6582ce98337a4479d596059

  • SSDEEP

    12288:LMrhy90ADACn1dQ4Hr1nEb3crjgrngFOW:Syf1dQ4Hreb3crsr0OW

Malware Config

Extracted

Family

amadey

Version

3.86

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

redline

Botnet

news

C2

77.91.68.68:19071

Attributes
  • auth_value

    99ba2ffe8d72ebe9fdc7e758c94db148

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729.exe
    "C:\Users\Admin\AppData\Local\Temp\05b48b2909386e117184a0bdde8c6718992cf21d07674042c9d076292b260729.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9124773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9124773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4716388.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4716388.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7651019.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7651019.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4041009.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4041009.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
            "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:2256
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:684
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "pdates.exe" /P "Admin:N"
                  7⤵
                    PID:2700
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:R" /E
                    7⤵
                      PID:556
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3724
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\925e7e99c5" /P "Admin:N"
                        7⤵
                          PID:1600
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:R" /E
                          7⤵
                            PID:3560
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2505651.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2505651.exe
                    3⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:3692
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6192642.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6192642.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3176
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3952
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4356

              Network

              • flag-us
                DNS
                28.118.140.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                28.118.140.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                g.bing.com
                Remote address:
                8.8.8.8:53
                Request
                g.bing.com
                IN A
                Response
                g.bing.com
                IN CNAME
                g-bing-com.dual-a-0034.a-msedge.net
                g-bing-com.dual-a-0034.a-msedge.net
                IN CNAME
                dual-a-0034.a-msedge.net
                dual-a-0034.a-msedge.net
                IN A
                204.79.197.237
                dual-a-0034.a-msedge.net
                IN A
                13.107.21.237
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MUID=30B88AA2831866CE1D559ED982A36787; domain=.bing.com; expires=Wed, 04-Jun-2025 13:21:52 GMT; path=/; SameSite=None; Secure; Priority=High;
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 92B64E40A93D42F9808009F727BA8B35 Ref B: LON04EDGE0910 Ref C: 2024-05-10T13:21:52Z
                date: Fri, 10 May 2024 13:21:52 GMT
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=30B88AA2831866CE1D559ED982A36787; _EDGE_S=SID=16B81E15A6B566E60AA80A6EA7FD674B
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MSPTC=7zQl5gg8F_IvNob5EdjJ9iFnZ_g7iwmYiPNIdDgW2Fg; domain=.bing.com; expires=Wed, 04-Jun-2025 13:21:52 GMT; path=/; Partitioned; secure; SameSite=None
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 0E2EEC65646542D5A345A08A48E400EE Ref B: LON04EDGE0910 Ref C: 2024-05-10T13:21:52Z
                date: Fri, 10 May 2024 13:21:52 GMT
              • flag-be
                GET
                https://www.bing.com/aes/c.gif?RG=7197464967c64ec381f5997f6b29bac0&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T133536Z&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266
                Remote address:
                2.17.107.131:443
                Request
                GET /aes/c.gif?RG=7197464967c64ec381f5997f6b29bac0&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T133536Z&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266 HTTP/2.0
                host: www.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=30B88AA2831866CE1D559ED982A36787
                Response
                HTTP/2.0 200
                cache-control: private,no-store
                pragma: no-cache
                vary: Origin
                p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 73F520E9DB9C4C24B1C96805A275B2F8 Ref B: BRU30EDGE0809 Ref C: 2024-05-10T13:21:52Z
                content-length: 0
                date: Fri, 10 May 2024 13:21:52 GMT
                set-cookie: _EDGE_S=SID=16B81E15A6B566E60AA80A6EA7FD674B; path=/; httponly; domain=bing.com
                set-cookie: MUIDB=30B88AA2831866CE1D559ED982A36787; path=/; httponly; expires=Wed, 04-Jun-2025 13:21:52 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.7f6b1102.1715347312.62bf00e
              • flag-us
                DNS
                237.197.79.204.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                237.197.79.204.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                77.190.18.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                77.190.18.2.in-addr.arpa
                IN PTR
                Response
                77.190.18.2.in-addr.arpa
                IN PTR
                a2-18-190-77deploystaticakamaitechnologiescom
              • flag-us
                DNS
                131.107.17.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                131.107.17.2.in-addr.arpa
                IN PTR
                Response
                131.107.17.2.in-addr.arpa
                IN PTR
                a2-17-107-131deploystaticakamaitechnologiescom
              • flag-us
                DNS
                95.221.229.192.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                95.221.229.192.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                72.32.126.40.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                72.32.126.40.in-addr.arpa
                IN PTR
                Response
              • flag-be
                GET
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                Remote address:
                2.17.107.131:443
                Request
                GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
                host: www.bing.com
                accept: */*
                cookie: MUID=30B88AA2831866CE1D559ED982A36787; _EDGE_S=SID=16B81E15A6B566E60AA80A6EA7FD674B; MSPTC=7zQl5gg8F_IvNob5EdjJ9iFnZ_g7iwmYiPNIdDgW2Fg; MUIDB=30B88AA2831866CE1D559ED982A36787
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-type: image/png
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}&ndcParam=QWthbWFp
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                content-length: 1107
                date: Fri, 10 May 2024 13:21:54 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.7f6b1102.1715347314.62bf6f1
              • flag-us
                DNS
                55.36.223.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                55.36.223.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                217.106.137.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                217.106.137.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                79.190.18.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                79.190.18.2.in-addr.arpa
                IN PTR
                Response
                79.190.18.2.in-addr.arpa
                IN PTR
                a2-18-190-79deploystaticakamaitechnologiescom
              • flag-us
                DNS
                21.236.111.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                21.236.111.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                tse1.mm.bing.net
                Remote address:
                8.8.8.8:53
                Request
                tse1.mm.bing.net
                IN A
                Response
                tse1.mm.bing.net
                IN CNAME
                mm-mm.bing.net.trafficmanager.net
                mm-mm.bing.net.trafficmanager.net
                IN CNAME
                dual-a-0001.a-msedge.net
                dual-a-0001.a-msedge.net
                IN A
                204.79.197.200
                dual-a-0001.a-msedge.net
                IN A
                13.107.21.200
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239381705589_1UZ6HI7DU1RQLXLFR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239381705589_1UZ6HI7DU1RQLXLFR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 464243
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 07773B1A4F9A490DA8AC73D052E781B8 Ref B: LON04EDGE0608 Ref C: 2024-05-10T13:23:32Z
                date: Fri, 10 May 2024 13:23:31 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239381702592_1OT5ET7HCG1M9EIRY&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239381702592_1OT5ET7HCG1M9EIRY&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 382817
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 5A706EF16567408B8A9BE59FA9DA0D24 Ref B: LON04EDGE0608 Ref C: 2024-05-10T13:23:32Z
                date: Fri, 10 May 2024 13:23:31 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239381702593_1BLW9LYE0FMIB48EX&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239381702593_1BLW9LYE0FMIB48EX&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 476246
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 3D51861D12F64406B1763AF8DB5A8B57 Ref B: LON04EDGE0608 Ref C: 2024-05-10T13:23:32Z
                date: Fri, 10 May 2024 13:23:31 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239381705588_1WA9C34P2B6OXP331&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239381705588_1WA9C34P2B6OXP331&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 499516
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: FF7D44E8732C43B3A3358EB136A37DA9 Ref B: LON04EDGE0608 Ref C: 2024-05-10T13:23:32Z
                date: Fri, 10 May 2024 13:23:31 GMT
              • 204.79.197.237:443
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF
                tls, http2
                2.5kB
                9.6kB
                20
                17

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF

                HTTP Response

                204

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8RqhVTPi1VqQF1gIztyOGKzVUCUyAYefBV4sNnbqjpmfEmTZzlv-q_0LIOaDYI0orqkCGsk0e-h6vLWKVFQ8kYBlmWjTBxBIynfgxYxi2zVN113ZbOyefIiuwFXo7sbOpLdT7ok1_Fo73aiRddqbkXQ_Rebz442o5j7d9XohdWnzL5Age%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D30ee740affe51fc592eb1221526cff77&TIME=20240426T133536Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266&muid=ADDDFB3EF7AA0DA8A4964D397794E5DF

                HTTP Response

                204
              • 2.17.107.131:443
                https://www.bing.com/aes/c.gif?RG=7197464967c64ec381f5997f6b29bac0&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T133536Z&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266
                tls, http2
                1.5kB
                5.4kB
                17
                12

                HTTP Request

                GET https://www.bing.com/aes/c.gif?RG=7197464967c64ec381f5997f6b29bac0&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T133536Z&adUnitId=11730597&localId=w:ADDDFB3E-F7AA-0DA8-A496-4D397794E5DF&deviceId=6896200621815266

                HTTP Response

                200
              • 2.17.107.131:443
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                tls, http2
                1.7kB
                6.4kB
                18
                13

                HTTP Request

                GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

                HTTP Response

                200
              • 77.91.68.61:80
                pdates.exe
                260 B
                5
              • 77.91.68.68:19071
                d6192642.exe
                260 B
                5
              • 77.91.68.61:80
                pdates.exe
                260 B
                5
              • 77.91.68.68:19071
                d6192642.exe
                260 B
                5
              • 77.91.68.61:80
                pdates.exe
                260 B
                5
              • 77.91.68.68:19071
                d6192642.exe
                260 B
                5
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                https://tse1.mm.bing.net/th?id=OADD2.10239381705588_1WA9C34P2B6OXP331&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                tls, http2
                64.3kB
                1.9MB
                1374
                1366

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239381705589_1UZ6HI7DU1RQLXLFR&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239381702592_1OT5ET7HCG1M9EIRY&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239381702593_1BLW9LYE0FMIB48EX&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239381705588_1WA9C34P2B6OXP331&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                13
              • 77.91.68.68:19071
                d6192642.exe
                260 B
                5
              • 77.91.68.68:19071
                d6192642.exe
                156 B
                3
              • 8.8.8.8:53
                28.118.140.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                28.118.140.52.in-addr.arpa

              • 8.8.8.8:53
                g.bing.com
                dns
                56 B
                151 B
                1
                1

                DNS Request

                g.bing.com

                DNS Response

                204.79.197.237
                13.107.21.237

              • 8.8.8.8:53
                237.197.79.204.in-addr.arpa
                dns
                73 B
                143 B
                1
                1

                DNS Request

                237.197.79.204.in-addr.arpa

              • 8.8.8.8:53
                77.190.18.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                77.190.18.2.in-addr.arpa

              • 8.8.8.8:53
                131.107.17.2.in-addr.arpa
                dns
                71 B
                135 B
                1
                1

                DNS Request

                131.107.17.2.in-addr.arpa

              • 8.8.8.8:53
                95.221.229.192.in-addr.arpa
                dns
                73 B
                144 B
                1
                1

                DNS Request

                95.221.229.192.in-addr.arpa

              • 8.8.8.8:53
                72.32.126.40.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                72.32.126.40.in-addr.arpa

              • 8.8.8.8:53
                55.36.223.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                55.36.223.20.in-addr.arpa

              • 8.8.8.8:53
                217.106.137.52.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                217.106.137.52.in-addr.arpa

              • 8.8.8.8:53
                79.190.18.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                79.190.18.2.in-addr.arpa

              • 8.8.8.8:53
                21.236.111.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                21.236.111.52.in-addr.arpa

              • 8.8.8.8:53
                tse1.mm.bing.net
                dns
                62 B
                173 B
                1
                1

                DNS Request

                tse1.mm.bing.net

                DNS Response

                204.79.197.200
                13.107.21.200

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6192642.exe

                Filesize

                175KB

                MD5

                660c745e3bc446aebd5e95bea410993b

                SHA1

                c46d33504bc5ef550542d07f74bd4f1e7826da03

                SHA256

                bb97c8811add79cf2f4a231939bd29e2ef398b6c747a6810263782a90f7b9ef5

                SHA512

                a61ab6e6f9ab0bb17d1306967fcd6f6c9647c0d101ab1686451edccb641d7bb75acccb0ec13482f87d505d1508d56577ce7c22ae0102e4e4e526cbf6fdea08fa

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9124773.exe

                Filesize

                359KB

                MD5

                1969cc55ecdb4ba432f9df129b085fde

                SHA1

                578c239149aa29ea2edad5c751a86d57b145e3f0

                SHA256

                77f32b63d23c002e89fbbe13bd4a1cf8b005e7d988f6f580d58526a7882eb10f

                SHA512

                358147fba496d3222ad4bf76b7edba4121005a7413dc423db3b438b38f3ad33e979645961a5d0b4661f5557dc66ee0e1a4bdacbe4feb475df747f2a8397125ed

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2505651.exe

                Filesize

                35KB

                MD5

                ba117cdee0f70dde00678528d15b0c49

                SHA1

                003a382b1a54b86999d15334ab118792f8313399

                SHA256

                65ba81cbbf5db895c8091707aec81f6c8390339700187299312c1b9c7ac8b0a0

                SHA512

                d395155fe71ba9073ef3154a03f974df8205c8fb7a57c11fcbab93209e862a12f4bcd8d51ce96f3095fa8cfb9cf7978f160065534dc01dc942b7a2458562f6d7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4716388.exe

                Filesize

                234KB

                MD5

                4f02a923ce0a518b99841b16da953969

                SHA1

                71b2bd669764fe784c80b0433dafe5e9e1564e5b

                SHA256

                e12ecc6f8d8bc6e6c5ec72b084e0391fb9d6e2b23619536b9453e5a83feca66f

                SHA512

                ff0f59f919005ec79a075dae8b13c07f508047c37eced3c7ad5c0c6c1199e74bf99f0c327e6c6536a451822397cc10e7d0231110e90d46aebafc093804e50ef5

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7651019.exe

                Filesize

                13KB

                MD5

                864b6322ef4be9192d857e078e2a69d8

                SHA1

                24680c8fa196f0a1bf8cf51814149441f138f453

                SHA256

                1deb97c02d57f4c00871baa9e93d96541a9419c22cdcfb4cb5d7c152f957b07b

                SHA512

                365f2222be84643e5008ba5999bfd38623787a92fc58b10194775275b5fb1804736206c47739438bae44c6ad5ae502a5bf1f3ce7823d594606f409bb2420a5cb

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4041009.exe

                Filesize

                223KB

                MD5

                8c118872da7c5c6359306afdf405fb02

                SHA1

                4caf741d452520d043d7010380149a25d9f44bd5

                SHA256

                ac1cd3a1d8a1f854838b8a97fed679078f7d4295ebba95f5a2e7e90bd687845d

                SHA512

                f2037cf9435b1f976e43d6f5c737b50477c03d345054bfccf53075c75ee6de9c343bb55407078bf76fa4c0bad8c3ae13572edf85e34833dba952be507dc8c43c

              • memory/3176-47-0x000000000ADC0000-0x000000000AECA000-memory.dmp

                Filesize

                1.0MB

              • memory/3176-44-0x0000000000E10000-0x0000000000E40000-memory.dmp

                Filesize

                192KB

              • memory/3176-45-0x00000000031A0000-0x00000000031A6000-memory.dmp

                Filesize

                24KB

              • memory/3176-46-0x000000000B2C0000-0x000000000B8D8000-memory.dmp

                Filesize

                6.1MB

              • memory/3176-48-0x000000000AD00000-0x000000000AD12000-memory.dmp

                Filesize

                72KB

              • memory/3176-49-0x000000000AD60000-0x000000000AD9C000-memory.dmp

                Filesize

                240KB

              • memory/3176-50-0x0000000003120000-0x000000000316C000-memory.dmp

                Filesize

                304KB

              • memory/3692-40-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/5092-22-0x00000000007B0000-0x00000000007BA000-memory.dmp

                Filesize

                40KB

              • memory/5092-21-0x00007FFCBFEC3000-0x00007FFCBFEC5000-memory.dmp

                Filesize

                8KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.