Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 01:52 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
-
Size
526KB
-
MD5
4c534640c1640866fb3f340b7f2f097b
-
SHA1
87335d6780313da3243963768c56a1d57da4ffba
-
SHA256
74f7681392fa6d1d6c62467d8a9b3ab60df26820ce60fad04585b7cb68d444b1
-
SHA512
7b66b294999d9266a476e40e0b263197a499207a7d82c7cf22b1ad55bf458a281dc967b273255665f2232c4698365ac483735412bd7248ecc8c8e17a543e3ab5
-
SSDEEP
12288:FVpo70X4yQySH6u40Prkl84/0zGoPqLbI16MMcxwireV:F3+0Xh46N+2czaPE6MHxw7
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "services.exe" qvodplay7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe qvodplay7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 996 QvodSetup5.exe 4452 qvodplay7.exe 976 ~24065665.exe -
resource yara_rule behavioral2/files/0x000700000002326e-5.dat upx behavioral2/memory/996-17-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/files/0x00080000000234bd-20.dat upx behavioral2/memory/4452-21-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4452-31-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/996-30-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/4452-33-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4452-34-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/996-35-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/4452-36-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/996-45-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/4452-46-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/996-49-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/996-51-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/996-59-0x0000000000400000-0x00000000004E7000-memory.dmp upx behavioral2/memory/996-65-0x0000000000400000-0x00000000004E7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Windows\\system32\\0xFso.exe" qvodplay7.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\0xFso.exe qvodplay7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 4452 qvodplay7.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe 976 ~24065665.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4452 qvodplay7.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 996 QvodSetup5.exe 996 QvodSetup5.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 996 QvodSetup5.exe 996 QvodSetup5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1476 wrote to memory of 996 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 84 PID 1476 wrote to memory of 996 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 84 PID 1476 wrote to memory of 996 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 84 PID 1476 wrote to memory of 4452 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 85 PID 1476 wrote to memory of 4452 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 85 PID 1476 wrote to memory of 4452 1476 4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe 85 PID 4452 wrote to memory of 976 4452 qvodplay7.exe 99 PID 4452 wrote to memory of 976 4452 qvodplay7.exe 99 PID 4452 wrote to memory of 976 4452 qvodplay7.exe 99 PID 976 wrote to memory of 3008 976 ~24065665.exe 100 PID 976 wrote to memory of 3008 976 ~24065665.exe 100 PID 976 wrote to memory of 3008 976 ~24065665.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\~24065665.exeC:\Users\Admin\AppData\Local\Temp\~24065665.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.execmd4⤵PID:3008
-
-
-
Network
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request147.142.123.92.in-addr.arpaIN PTRResponse147.142.123.92.in-addr.arpaIN PTRa92-123-142-147deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.28.10ax-0001.ax-msedge.netIN A150.171.27.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 751091
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BBCA2007D3B649179E53DE64DE095BA1 Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388069_1LR6CG2CYQVB72KAZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239339388069_1LR6CG2CYQVB72KAZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 502729
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8FAEAE4AA4474984AD2BD8ED87C370C4 Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301365_1T2JA9OXDN9GY4HXW&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317301365_1T2JA9OXDN9GY4HXW&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 866696
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 10265254CE9D4FDF98A547372D32BEF9 Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300932_1F3XVYLI2C551DUEM&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317300932_1F3XVYLI2C551DUEM&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 639396
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C43E4D40EE5746A2AD052EB9F594884A Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388068_1L9UIL4HSMYJDR381&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239339388068_1L9UIL4HSMYJDR381&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 892656
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 07A511BF7A9C413FB5364762E8E42418 Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 473680
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 989BE8C1E6844DA99777DC7562316E6E Ref B: LON04EDGE0709 Ref C: 2024-07-16T01:53:54Z
date: Tue, 16 Jul 2024 01:53:54 GMT
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestinl7.oi1i.comIN AResponse
-
Remote address:8.8.8.8:53Requestqd.kuaibo.comIN AResponse
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
150.171.28.10:443https://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2147.1kB 4.3MB 3113 3109
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340417880_1PRMSECURT9IUDN7Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388069_1LR6CG2CYQVB72KAZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301365_1T2JA9OXDN9GY4HXW&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300932_1F3XVYLI2C551DUEM&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388068_1L9UIL4HSMYJDR381&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418534_1SATV94N425TECTRU&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
147.142.123.92.in-addr.arpa
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.28.10150.171.27.10
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 132 B 1 1
DNS Request
inl7.oi1i.com
-
59 B 127 B 1 1
DNS Request
qd.kuaibo.com
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD559e20e2ec60d5946ad54b64a3deb1c83
SHA17027c9308b7b2d14ff9fd7b81efa81a1c9a0ec68
SHA256538c299746b0afa502968f74f13220069a204e06d008c429a19762ee7ae097bc
SHA512283824f4d63fdef8eba6a078dc7dcaff401cc13aee6e3c970f0505772b4b1525e2ad805dc2e90b3140f3d9523ea7db575eaf860db60f6c2b4a8edb289d447aa9
-
Filesize
29KB
MD51a3440da9f8f5cad3319d8b2e17772be
SHA1fb3c6ec93d7d15228f77d71651a8f24a1a35facf
SHA25609c7ece20c9b50b0d272cc40c45a965d289a9ae73441a0b893de3c9532aeeae3
SHA512b22e08e4fc4a4acb760a3d56992b9d73f1ccb5ac2eaff04f66587b55b3a3396f3760840c50e7800f1e51cd95ef95f6d70a41e6c3766ed60cb41ada85920c5e23
-
Filesize
8KB
MD51c85b838536b8027027ed9a9019f6e57
SHA1193086e31000ad275b91798e6ab2bf1823f28fb7
SHA256513684483d92bef7b9ea5f279b47cededbfa059bd7688f0944cd9c3e0a7c4c3c
SHA5127fa2da850652713edc6e187d0014f12ae877d8f6699160a4e0b1ed6d8163279316ace4d81373ee98f22a7f5b816f81a531af1a23c0e9ebb35546e9f8e0d9e25c