Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 19:04 UTC

General

  • Target

    c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe

  • Size

    812KB

  • MD5

    f5f40df358fb020b709a87b5ed4ec4d3

  • SHA1

    7a1412af73b32c7c9a61007863b57f50570645b2

  • SHA256

    c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435

  • SHA512

    f45fd35998f15a6204494bb8e99391571f35e6e4867e56bf78a818062c75942eea2a63cf93df732f7ed0d6eaf79d49e4a165b1b6ad62df994550e57a1125d3ba

  • SSDEEP

    12288:AMrsy90fafIyG5ojpCh/IL7ElM0kHP5/rmMsj+IgMcFLzZp1/9mOh8++OM:cyMojpCh/+7C4xrmMi+I4Fpr/kOh8D3

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

redline

Botnet

mrak

C2

77.91.124.82:19071

Attributes
  • auth_value

    7d9a335ab5dfd42d374867c96fe25302

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
    "C:\Users\Admin\AppData\Local\Temp\c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1387297.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1387297.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2122202.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2122202.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8979577.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8979577.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8871577.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8871577.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:456
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4096492.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4096492.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2956
            • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
              "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3452
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:644
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3280
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:856
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "saves.exe" /P "Admin:N"
                    8⤵
                      PID:3084
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "saves.exe" /P "Admin:R" /E
                      8⤵
                        PID:892
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:4080
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\b40d11255d" /P "Admin:N"
                          8⤵
                            PID:1928
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\b40d11255d" /P "Admin:R" /E
                            8⤵
                              PID:5056
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5613002.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5613002.exe
                      4⤵
                      • Executes dropped EXE
                      PID:1032
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:2564
              • C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe
                1⤵
                • Executes dropped EXE
                PID:4420

              Network

              • flag-us
                DNS
                133.211.185.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                133.211.185.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                67.31.126.40.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                67.31.126.40.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                g.bing.com
                Remote address:
                8.8.8.8:53
                Request
                g.bing.com
                IN A
                Response
                g.bing.com
                IN CNAME
                g-bing-com.dual-a-0034.a-msedge.net
                g-bing-com.dual-a-0034.a-msedge.net
                IN CNAME
                dual-a-0034.a-msedge.net
                dual-a-0034.a-msedge.net
                IN A
                204.79.197.237
                dual-a-0034.a-msedge.net
                IN A
                13.107.21.237
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MUID=35BD18E0512E668E04720C6750CE6754; domain=.bing.com; expires=Mon, 16-Jun-2025 19:04:26 GMT; path=/; SameSite=None; Secure; Priority=High;
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 4431D3CBA15A434BB461406472189C64 Ref B: LON04EDGE1119 Ref C: 2024-05-22T19:04:26Z
                date: Wed, 22 May 2024 19:04:25 GMT
              • flag-us
                GET
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB
                Remote address:
                204.79.197.237:443
                Request
                GET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB HTTP/2.0
                host: g.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=35BD18E0512E668E04720C6750CE6754; _EDGE_S=SID=0A88E4F8A4546C972C69F07FA5FE6D20
                Response
                HTTP/2.0 204
                cache-control: no-cache, must-revalidate
                pragma: no-cache
                expires: Fri, 01 Jan 1990 00:00:00 GMT
                set-cookie: MSPTC=GoI_OQ6uhXGiQu2CUJIzGPmL7mJmCZorE0hgylPjEfg; domain=.bing.com; expires=Mon, 16-Jun-2025 19:04:26 GMT; path=/; Partitioned; secure; SameSite=None
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                access-control-allow-origin: *
                x-cache: CONFIG_NOCACHE
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: E7EC3AA70C5F44BEAD7CCB11B5CE9F68 Ref B: LON04EDGE1119 Ref C: 2024-05-22T19:04:26Z
                date: Wed, 22 May 2024 19:04:25 GMT
              • flag-nl
                GET
                https://www.bing.com/aes/c.gif?RG=8752bb2618d14f318ae0e5e520760707&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240508T114007Z&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981
                Remote address:
                23.62.61.97:443
                Request
                GET /aes/c.gif?RG=8752bb2618d14f318ae0e5e520760707&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240508T114007Z&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981 HTTP/2.0
                host: www.bing.com
                accept-encoding: gzip, deflate
                user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                cookie: MUID=35BD18E0512E668E04720C6750CE6754
                Response
                HTTP/2.0 200
                cache-control: private,no-store
                pragma: no-cache
                vary: Origin
                p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 6728605A42C9408D833C86E17A6C7EFA Ref B: DUS30EDGE0707 Ref C: 2024-05-22T19:04:26Z
                content-length: 0
                date: Wed, 22 May 2024 19:04:26 GMT
                set-cookie: _EDGE_S=SID=0A88E4F8A4546C972C69F07FA5FE6D20; path=/; httponly; domain=bing.com
                set-cookie: MUIDB=35BD18E0512E668E04720C6750CE6754; path=/; httponly; expires=Mon, 16-Jun-2025 19:04:26 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.5d3d3e17.1716404666.8beee0d
              • flag-us
                DNS
                237.197.79.204.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                237.197.79.204.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                97.61.62.23.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                97.61.62.23.in-addr.arpa
                IN PTR
                Response
                97.61.62.23.in-addr.arpa
                IN PTR
                a23-62-61-97deploystaticakamaitechnologiescom
              • flag-nl
                GET
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                Remote address:
                23.62.61.97:443
                Request
                GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
                host: www.bing.com
                accept: */*
                cookie: MUID=35BD18E0512E668E04720C6750CE6754; _EDGE_S=SID=0A88E4F8A4546C972C69F07FA5FE6D20; MSPTC=GoI_OQ6uhXGiQu2CUJIzGPmL7mJmCZorE0hgylPjEfg; MUIDB=35BD18E0512E668E04720C6750CE6754
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-type: image/png
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                content-length: 1107
                date: Wed, 22 May 2024 19:04:27 GMT
                alt-svc: h3=":443"; ma=93600
                x-cdn-traceid: 0.5d3d3e17.1716404667.8bef19a
              • flag-us
                DNS
                50.23.12.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                50.23.12.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                198.187.3.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                198.187.3.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                13.86.106.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                13.86.106.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                209.197.17.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                209.197.17.2.in-addr.arpa
                IN PTR
                Response
                209.197.17.2.in-addr.arpa
                IN PTR
                a2-17-197-209deploystaticakamaitechnologiescom
              • flag-us
                DNS
                29.243.111.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                29.243.111.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                240.197.17.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                240.197.17.2.in-addr.arpa
                IN PTR
                Response
                240.197.17.2.in-addr.arpa
                IN PTR
                a2-17-197-240deploystaticakamaitechnologiescom
              • flag-us
                DNS
                tse1.mm.bing.net
                Remote address:
                8.8.8.8:53
                Request
                tse1.mm.bing.net
                IN A
                Response
                tse1.mm.bing.net
                IN CNAME
                mm-mm.bing.net.trafficmanager.net
                mm-mm.bing.net.trafficmanager.net
                IN CNAME
                dual-a-0001.a-msedge.net
                dual-a-0001.a-msedge.net
                IN A
                204.79.197.200
                dual-a-0001.a-msedge.net
                IN A
                13.107.21.200
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 430689
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 995BDF2B447B47E38F0E92E69A58DDC1 Ref B: LON04EDGE1120 Ref C: 2024-05-22T19:06:06Z
                date: Wed, 22 May 2024 19:06:05 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 415458
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 256E49C22CA4479FBBFB82C358AFE369 Ref B: LON04EDGE1120 Ref C: 2024-05-22T19:06:06Z
                date: Wed, 22 May 2024 19:06:05 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 792794
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: F31DDB80D75C480E9ACD947B9DF79C4D Ref B: LON04EDGE1120 Ref C: 2024-05-22T19:06:06Z
                date: Wed, 22 May 2024 19:06:05 GMT
              • flag-us
                GET
                https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                Remote address:
                204.79.197.200:443
                Request
                GET /th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                host: tse1.mm.bing.net
                accept: */*
                accept-encoding: gzip, deflate, br
                user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                Response
                HTTP/2.0 200
                cache-control: public, max-age=2592000
                content-length: 627437
                content-type: image/jpeg
                x-cache: TCP_HIT
                access-control-allow-origin: *
                access-control-allow-headers: *
                access-control-allow-methods: GET, POST, OPTIONS
                timing-allow-origin: *
                report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                x-msedge-ref: Ref A: 98B5A04CA18049A8B64EE6384808A9FD Ref B: LON04EDGE1120 Ref C: 2024-05-22T19:06:06Z
                date: Wed, 22 May 2024 19:06:05 GMT
              • flag-us
                DNS
                200.197.79.204.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                200.197.79.204.in-addr.arpa
                IN PTR
                Response
                200.197.79.204.in-addr.arpa
                IN PTR
                a-0001a-msedgenet
              • flag-us
                DNS
                9.179.89.13.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                9.179.89.13.in-addr.arpa
                IN PTR
                Response
              • 204.79.197.237:443
                https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB
                tls, http2
                2.5kB
                9.0kB
                20
                17

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB

                HTTP Response

                204

                HTTP Request

                GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8Zu0BxSGwW_qmKnUgXjWcwjVUCUyWIgJdz2UpBSUdc1DZwzx0X_A1PrC3YccJR80kOsPxhnaN7bbTa94smOvSPfcRk0UtTdVCuA4LqWY6cfoJf6c1wQ52RRJjw-V5kJgiznsuBVxUOSQqzQQhoONBu4NxJ6SZJunHwovq7DdOE2_6GgQt%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3Dffb0d4f7a7161c2c6576b2ccc3488bf5&TIME=20240508T114007Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981&muid=F93159F48ABC3E2BDF7350B998F17BEB

                HTTP Response

                204
              • 23.62.61.97:443
                https://www.bing.com/aes/c.gif?RG=8752bb2618d14f318ae0e5e520760707&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240508T114007Z&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981
                tls, http2
                1.4kB
                5.3kB
                16
                10

                HTTP Request

                GET https://www.bing.com/aes/c.gif?RG=8752bb2618d14f318ae0e5e520760707&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240508T114007Z&adUnitId=11730597&localId=w:F93159F4-8ABC-3E2B-DF73-50B998F17BEB&deviceId=6825829378917981

                HTTP Response

                200
              • 23.62.61.97:443
                https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
                tls, http2
                1.6kB
                6.4kB
                16
                12

                HTTP Request

                GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

                HTTP Response

                200
              • 77.91.124.82:19071
                i5613002.exe
                260 B
                5
              • 77.91.68.18:80
                saves.exe
                260 B
                5
              • 77.91.124.82:19071
                i5613002.exe
                260 B
                5
              • 77.91.68.18:80
                saves.exe
                260 B
                5
              • 77.91.124.82:19071
                i5613002.exe
                260 B
                5
              • 77.91.68.18:80
                saves.exe
                260 B
                5
              • 77.91.124.82:19071
                i5613002.exe
                260 B
                5
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                tls, http2
                81.0kB
                2.4MB
                1711
                1706

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                HTTP Request

                GET https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200

                HTTP Response

                200
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 204.79.197.200:443
                tse1.mm.bing.net
                tls, http2
                1.2kB
                8.1kB
                16
                14
              • 77.91.124.82:19071
                i5613002.exe
                260 B
                5
              • 77.91.124.82:19071
                i5613002.exe
                156 B
                3
              • 8.8.8.8:53
                133.211.185.52.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                133.211.185.52.in-addr.arpa

              • 8.8.8.8:53
                67.31.126.40.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                67.31.126.40.in-addr.arpa

              • 8.8.8.8:53
                g.bing.com
                dns
                56 B
                151 B
                1
                1

                DNS Request

                g.bing.com

                DNS Response

                204.79.197.237
                13.107.21.237

              • 8.8.8.8:53
                237.197.79.204.in-addr.arpa
                dns
                73 B
                143 B
                1
                1

                DNS Request

                237.197.79.204.in-addr.arpa

              • 8.8.8.8:53
                97.61.62.23.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                97.61.62.23.in-addr.arpa

              • 8.8.8.8:53
                50.23.12.20.in-addr.arpa
                dns
                70 B
                156 B
                1
                1

                DNS Request

                50.23.12.20.in-addr.arpa

              • 8.8.8.8:53
                198.187.3.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                198.187.3.20.in-addr.arpa

              • 8.8.8.8:53
                13.86.106.20.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                13.86.106.20.in-addr.arpa

              • 8.8.8.8:53
                209.197.17.2.in-addr.arpa
                dns
                71 B
                135 B
                1
                1

                DNS Request

                209.197.17.2.in-addr.arpa

              • 8.8.8.8:53
                29.243.111.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                29.243.111.52.in-addr.arpa

              • 8.8.8.8:53
                240.197.17.2.in-addr.arpa
                dns
                71 B
                135 B
                1
                1

                DNS Request

                240.197.17.2.in-addr.arpa

              • 8.8.8.8:53
                tse1.mm.bing.net
                dns
                62 B
                173 B
                1
                1

                DNS Request

                tse1.mm.bing.net

                DNS Response

                204.79.197.200
                13.107.21.200

              • 8.8.8.8:53
                200.197.79.204.in-addr.arpa
                dns
                73 B
                106 B
                1
                1

                DNS Request

                200.197.79.204.in-addr.arpa

              • 8.8.8.8:53
                9.179.89.13.in-addr.arpa
                dns
                70 B
                144 B
                1
                1

                DNS Request

                9.179.89.13.in-addr.arpa

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1387297.exe

                Filesize

                706KB

                MD5

                522fdd513a2e5654aaa1a86d8e877b19

                SHA1

                b36b076c3e4bea5f683ed6fd65e0f56f59fd4703

                SHA256

                fab11a184d850740e499a941bbd192c2ae7a487a63a67ea2f0a7c0a45aef14fa

                SHA512

                174fd0cc19fcb878a7035aece12c2e9ddaef1a0137ad601b73bad309a98db421543e86f1bb6f581e515605582c75c0b7b8fa6c02df629bc184b7db137627c612

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2122202.exe

                Filesize

                540KB

                MD5

                1a745ab8cfd599fc9c392009aacafbaa

                SHA1

                9f522b3692ba9e2c5833a1c5e5f45c198692c4b8

                SHA256

                f24e88d400df87994bf16d3edc7036915254a98ac02cdb85d7a7daf8338f8075

                SHA512

                28d810a014daad02f78d71706f3cf9c74ae1945f98636e31f3752c16a11df0f92171208e42c44de5a6c082e56699f9f01a7c733e9c511e521af7c6445894b21a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5613002.exe

                Filesize

                173KB

                MD5

                7864b1aff2c27dd1452aa65fa83b545a

                SHA1

                ebb0d7fe16ffdd7dc3c90ee61f42120d8479b9a1

                SHA256

                54ad7fb552b2eac93cd95105cf40c2a1b1a219733c536c11ba93ea8d8dee8985

                SHA512

                cc573f625b4bf617287ea94d1ee686dbe243589107c9803b72c4f38469692bd4481277bdcca08987be0c14c705ac08e5f2e58b4c4b0832957b32b9e71a4d6525

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8979577.exe

                Filesize

                384KB

                MD5

                ea910a7ec0183340f8856c5895f0e75e

                SHA1

                6ab28ea7b498b01c81b0ddaf623aa44c4324ae5b

                SHA256

                81d51185b167aca1b95751beab6f801780af97c16ed63046b5011dbcfd51267e

                SHA512

                ce64f7d346ee014e005cf07dead2d2252fac07204579031215e5ba4fa09a93cd55fab5fc9feb502a2cbfa6b7fb3c32b0da77b136e513de342636af7c8ecc2f2f

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8871577.exe

                Filesize

                185KB

                MD5

                9ac79fd58e2092e7d6d33c9798339513

                SHA1

                98023b23d8675ae3f8f09ead186d86b04e49f03d

                SHA256

                b76bbfc7392e271c95f11f70e4d21d0a15a03458f6828e88257a037f5b6ea66c

                SHA512

                ed99e76bd60a67fa6db1f91a7cb3ae6883fb23e48da47c4ed09b1b7067a87be7043a3a59671e5302ec37ce22d6e7c394deb799afe93bc79fe85016969575cc57

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4096492.exe

                Filesize

                335KB

                MD5

                d25095eecf2b86ee32bec8020907f858

                SHA1

                b07bf66a028e6c769e314ac6e06a12f62aa30e12

                SHA256

                7411f1a815a2b183c3759a3282b05c17f23324cb320a1190719c5ca136329d19

                SHA512

                61725e00b4fc3a0158b3228ce48933b33a13e122ae418bc30dfbc6a99b522978cafc3cb7e4a5e1899780abbba0b720eaaff50bf7790d224d100b2660253e0127

              • memory/456-58-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-36-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-30-0x00000000049A0000-0x00000000049BC000-memory.dmp

                Filesize

                112KB

              • memory/456-56-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-54-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-52-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-50-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-46-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-47-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-44-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-43-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-40-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-38-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-48-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-35-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-32-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-31-0x00000000049A0000-0x00000000049B6000-memory.dmp

                Filesize

                88KB

              • memory/456-29-0x0000000004BA0000-0x0000000005144000-memory.dmp

                Filesize

                5.6MB

              • memory/456-28-0x0000000002170000-0x000000000218E000-memory.dmp

                Filesize

                120KB

              • memory/1032-75-0x0000000000B80000-0x0000000000BB0000-memory.dmp

                Filesize

                192KB

              • memory/1032-76-0x0000000002ED0000-0x0000000002ED6000-memory.dmp

                Filesize

                24KB

              • memory/1032-77-0x0000000005AF0000-0x0000000006108000-memory.dmp

                Filesize

                6.1MB

              • memory/1032-78-0x00000000055E0000-0x00000000056EA000-memory.dmp

                Filesize

                1.0MB

              • memory/1032-79-0x0000000005500000-0x0000000005512000-memory.dmp

                Filesize

                72KB

              • memory/1032-80-0x0000000005560000-0x000000000559C000-memory.dmp

                Filesize

                240KB

              • memory/1032-81-0x00000000056F0000-0x000000000573C000-memory.dmp

                Filesize

                304KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.