Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 12:50 UTC
Static task
static1
Behavioral task
behavioral1
Sample
633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe
-
Size
960KB
-
MD5
633ea3f02e5af0b944e262579a0bd104
-
SHA1
f026dab6d57a0c91fc50426ad6eb302df3ade9cf
-
SHA256
2c4ec961cbfbd97190b73e8825c3326f343f0efcfea615fb88f7de48ff693b7f
-
SHA512
e81bbf4cf79a4d01dcb98d43e9c3ca20b118eda23d5b2567017df1f95302c92cef12ff133ef580418a9196a881321fa1cca68990b0da19521f0e2647b8793a04
-
SSDEEP
24576:QnHwA5D5D+iR6zhgqEgPjpdsUowULHGiYKm8:KV7LkCUoNHc8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4620 eNdw3.exe 4444 eNdw3.exe 444 eNdw3.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 eNdw3.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1480 set thread context of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 4620 set thread context of 4444 4620 eNdw3.exe 94 PID 4444 set thread context of 444 4444 eNdw3.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 444 eNdw3.exe Token: SeSecurityPrivilege 444 eNdw3.exe Token: SeTakeOwnershipPrivilege 444 eNdw3.exe Token: SeLoadDriverPrivilege 444 eNdw3.exe Token: SeSystemProfilePrivilege 444 eNdw3.exe Token: SeSystemtimePrivilege 444 eNdw3.exe Token: SeProfSingleProcessPrivilege 444 eNdw3.exe Token: SeIncBasePriorityPrivilege 444 eNdw3.exe Token: SeCreatePagefilePrivilege 444 eNdw3.exe Token: SeBackupPrivilege 444 eNdw3.exe Token: SeRestorePrivilege 444 eNdw3.exe Token: SeShutdownPrivilege 444 eNdw3.exe Token: SeDebugPrivilege 444 eNdw3.exe Token: SeSystemEnvironmentPrivilege 444 eNdw3.exe Token: SeChangeNotifyPrivilege 444 eNdw3.exe Token: SeRemoteShutdownPrivilege 444 eNdw3.exe Token: SeUndockPrivilege 444 eNdw3.exe Token: SeManageVolumePrivilege 444 eNdw3.exe Token: SeImpersonatePrivilege 444 eNdw3.exe Token: SeCreateGlobalPrivilege 444 eNdw3.exe Token: 33 444 eNdw3.exe Token: 34 444 eNdw3.exe Token: 35 444 eNdw3.exe Token: 36 444 eNdw3.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 3188 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 4620 eNdw3.exe 4444 eNdw3.exe 444 eNdw3.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 1480 wrote to memory of 3188 1480 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 91 PID 3188 wrote to memory of 4620 3188 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 92 PID 3188 wrote to memory of 4620 3188 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 92 PID 3188 wrote to memory of 4620 3188 633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe 92 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4620 wrote to memory of 4444 4620 eNdw3.exe 94 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95 PID 4444 wrote to memory of 444 4444 eNdw3.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\633ea3f02e5af0b944e262579a0bd104_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"C:\Users\Admin\AppData\Local\Temp\eNdw3.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:444
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request192.142.123.92.in-addr.arpaIN PTRResponse192.142.123.92.in-addr.arpaIN PTRa92-123-142-192deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN A
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request45.19.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.19.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 352599
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 12CBD01B3FDA47B8B4538A167FAF8274 Ref B: LON04EDGE0608 Ref C: 2024-07-22T12:52:58Z
date: Mon, 22 Jul 2024 12:52:58 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 357673
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F41FDD6A964F42C1B03233276E2B3755 Ref B: LON04EDGE0608 Ref C: 2024-07-22T12:52:58Z
date: Mon, 22 Jul 2024 12:52:58 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 331612
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 11DE155C83DB4B378E1BFC4AB6C63F27 Ref B: LON04EDGE0608 Ref C: 2024-07-22T12:52:58Z
date: Mon, 22 Jul 2024 12:52:58 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 343343
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 42DC5250A17C4EE68C14F4119EE5DC74 Ref B: LON04EDGE0608 Ref C: 2024-07-22T12:52:58Z
date: Mon, 22 Jul 2024 12:52:58 GMT
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
Remote address:8.8.8.8:53Request10.27.171.150.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.27.171.150.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestzap789.no-ip.orgIN AResponse
-
1.2kB 6.9kB 15 13
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http252.4kB 1.4MB 1069 1066
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301444_1ADW5UG9KMTHYULQ8&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301601_1XLI7BR2VR1H1YJXB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301192_1O6NEWTZHCNXAKIDN&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301011_1Q64Y8U9UJ0Y7FTOQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
192.142.123.92.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
124 B 122 B 2 1
DNS Request
zap789.no-ip.org
DNS Request
zap789.no-ip.org
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
124 B 244 B 2 2
DNS Request
zap789.no-ip.org
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
-
140 B 312 B 2 2
DNS Request
45.19.74.20.in-addr.arpa
DNS Request
45.19.74.20.in-addr.arpa
-
124 B 340 B 2 2
DNS Request
tse1.mm.bing.net
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
DNS Response
150.171.27.10150.171.28.10
-
124 B 244 B 2 2
DNS Request
zap789.no-ip.org
DNS Request
zap789.no-ip.org
-
144 B 316 B 2 2
DNS Request
10.27.171.150.in-addr.arpa
DNS Request
10.27.171.150.in-addr.arpa
-
62 B 122 B 1 1
DNS Request
zap789.no-ip.org
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD5bb8b36678d1c3c353815b399ee3421cf
SHA1cb69c3f98fb30b9a16dd39d73f35c62da617ea23
SHA256ed699c425584c12306c5673e96f769698504cf05d733696bdcee2964a4ad9b57
SHA5123e595c116f341046ebb03520b159fcba7c0f8a5f72f3e341a35ea1380b86c6ae5ca0f41fa9741ef70f87b68b99e5c2468206fa12f675aec5b828ce6a8d2409dd