Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 07:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe
Resource
win10v2004-20240802-en
General
-
Target
30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe
-
Size
74KB
-
MD5
532ea4a4f2b17530b9455ef88a4b331e
-
SHA1
7eb2dcc1173b0762a445dcc805276bb8c4756645
-
SHA256
30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779
-
SHA512
7f0bc0c7f05160c3c47aaa6a5ce07e1986196c8172f9c26f22cacb2a318212cf7ded90b2134a313e1b747c2fefeb879059607bbd4a61e702265dabf7578c119b
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOO:RshfSWHHNvoLqNwDDGw02eQmh0HjWOO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4716 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe File created C:\Windows\SysWOW64\¢«.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe File created C:\Windows\system\rundll32.exe 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1724224750" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1724224750" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4716 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 4716 rundll32.exe 4716 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 464 wrote to memory of 4716 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 87 PID 464 wrote to memory of 4716 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 87 PID 464 wrote to memory of 4716 464 30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe"C:\Users\Admin\AppData\Local\Temp\30e54a271ccd9cfb48daff15afe5f0b443922e0f693591c68d4cfcca7fc50779.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4716
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=2E1E04E1F845607C22031003F9A56137; domain=.bing.com; expires=Mon, 15-Sep-2025 07:19:11 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3AB0AF33C1984B6E80A2FF8BC5EDD85A Ref B: LON04EDGE1007 Ref C: 2024-08-21T07:19:11Z
date: Wed, 21 Aug 2024 07:19:10 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2E1E04E1F845607C22031003F9A56137
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=RzG2q_mBqqfa3t_rrwxVxbf5mpASY6ducW6C3jCXfEI; domain=.bing.com; expires=Mon, 15-Sep-2025 07:19:11 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F4D80011FC2D4A24906C3B08AB0DE1E8 Ref B: LON04EDGE1007 Ref C: 2024-08-21T07:19:11Z
date: Wed, 21 Aug 2024 07:19:10 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=2E1E04E1F845607C22031003F9A56137; MSPTC=RzG2q_mBqqfa3t_rrwxVxbf5mpASY6ducW6C3jCXfEI
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CDF10969975348AB9A76628E443758D5 Ref B: LON04EDGE1007 Ref C: 2024-08-21T07:19:11Z
date: Wed, 21 Aug 2024 07:19:10 GMT
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.143.123.92.in-addr.arpaIN PTRResponse240.143.123.92.in-addr.arpaIN PTRa92-123-143-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.zigui.orgIN AResponsewww.zigui.orgIN A103.251.237.123
-
Remote address:103.251.237.123:80RequestGET /article.php?id=103822 HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.zigui.org
Connection: Keep-Alive
ResponseHTTP/1.1 400 Bad Request
Date: Wed, 21 Aug 2024 07:19:12 GMT
Connection: close
Content-Length: 39
-
Remote address:8.8.8.8:53Request123.237.251.103.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request147.142.123.92.in-addr.arpaIN PTRResponse147.142.123.92.in-addr.arpaIN PTRa92-123-142-147deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360432890_1TOC5U5IB565A9QI0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360432890_1TOC5U5IB565A9QI0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 695371
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 268DDC78761C4FB1A7E647126D849FCC Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:52Z
date: Wed, 21 Aug 2024 07:20:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360432892_19VCX0OIIPQAUNJ24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360432892_19VCX0OIIPQAUNJ24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 747785
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 87EB4406D6FE467D86FE1D75822AC365 Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:52Z
date: Wed, 21 Aug 2024 07:20:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 675918
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8878323C20E94C3284443E998CAE28E9 Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:52Z
date: Wed, 21 Aug 2024 07:20:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301313_1BP2EQ0OTWFHQ8SRZ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301313_1BP2EQ0OTWFHQ8SRZ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 648234
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 28B86F022BEE481E8A7F2C9402071701 Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:52Z
date: Wed, 21 Aug 2024 07:20:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301722_1F4YKJYAF8ND8YNWI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301722_1F4YKJYAF8ND8YNWI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 576550
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: B1FE386E289C42E683FAB78F105C2EC6 Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:54Z
date: Wed, 21 Aug 2024 07:20:54 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 663266
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9F4FFB1677E9477EB50B834A19C531A5 Ref B: LON04EDGE0617 Ref C: 2024-08-21T07:20:55Z
date: Wed, 21 Aug 2024 07:20:54 GMT
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.27.171.150.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.27.171.150.in-addr.arpaIN PTR
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=tls, http22.0kB 9.3kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=32d52b3541e942fa86375d804deeb5ea&localId=w:568930E6-1262-9E23-EB49-CE8A389C3C60&deviceId=6966569430359306&anid=HTTP Response
204 -
523 B 300 B 5 3
HTTP Request
GET http://www.zigui.org/article.php?id=103822HTTP Response
400 -
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.8kB 15 12
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2143.6kB 4.2MB 3053 3047
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360432890_1TOC5U5IB565A9QI0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360432892_19VCX0OIIPQAUNJ24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301313_1BP2EQ0OTWFHQ8SRZ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301722_1F4YKJYAF8ND8YNWI&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.6kB 6.9kB 17 13
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
240.143.123.92.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
www.zigui.org
DNS Response
103.251.237.123
-
74 B 162 B 1 1
DNS Request
123.237.251.103.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
147.142.123.92.in-addr.arpa
-
222 B 128 B 3 1
DNS Request
172.214.232.199.in-addr.arpa
DNS Request
172.214.232.199.in-addr.arpa
DNS Request
172.214.232.199.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
26.35.223.20.in-addr.arpa
-
288 B 158 B 4 1
DNS Request
21.236.111.52.in-addr.arpa
DNS Request
21.236.111.52.in-addr.arpa
DNS Request
21.236.111.52.in-addr.arpa
DNS Request
21.236.111.52.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
10.27.171.150.in-addr.arpa
DNS Request
10.27.171.150.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5532c4abab8204c9837d20bfeb8a26346
SHA1b120f9e4ba3591bdae4a557249e4b30d845d69ad
SHA256918cf87bbafe15dc53df85ab1b8b58170355892c16e921ac62bf56fea71b4539
SHA51223572044e96b76faf7263d855ad1db792bfd7d38101f18b8a63b069b6dd588551bff88e4c4e60ac15ea4e2b72e6de1997f5dd0881203177984ca7f0cdb3722af
-
Filesize
79KB
MD5c929c9b4785fb225562f8fc74cd0ed06
SHA159cd7a646c5a21e15d703ebcd81b349a5bd27b4d
SHA2567ed99db82494854b9feb4a6d4637373acada260837757f9dc27dc7385c45383d
SHA512ee33aedc4c00beebf453ca90cd7a2fe8896fea032da84366f166b2b62c8f2339d79c0b24fc4bce086e604026ef9e75d0dd8259a980a956b6323857bf5f5e79da