Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 18:43 UTC

General

  • Target

    23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    23a5eb38c422eba6ad53f6f87750a409

  • SHA1

    deedef041d8adba3a03bf0171034361b9addea85

  • SHA256

    baaf52f06256430addfe4303d0c4e0643c3d0c0a10f50912dc1d4a44d3d63265

  • SHA512

    a7c9885d2995b977452c40ff469c01e92e57d7a76050f7915128d98892566c6c1c2897e2f023a0d26b2edf56051484084c01ab8ce24b96060643845447ae50b8

  • SSDEEP

    24576:qGVOaElGNkG1BZ1i3NTjL++PzFRdE89K7j8jEShHYWrnF8LNYwA8J5:eCtEJz37I70ESlYWLaBr5

Malware Config

Extracted

Family

latentbot

C2

eragondaboss.zapto.org

1eragondaboss.zapto.org

2eragondaboss.zapto.org

3eragondaboss.zapto.org

4eragondaboss.zapto.org

5eragondaboss.zapto.org

6eragondaboss.zapto.org

7eragondaboss.zapto.org

8eragondaboss.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies firewall policy service 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
        3⤵
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
          4⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3628
          • C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\23a5eb38c422eba6ad53f6f87750a409_JaffaCakes118.exe
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\23A5EB~1.EXE
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4688
              • C:\Windows\SysWOW64\timeout.exe
                timeout 5
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:1516
          • C:\Users\Admin\AppData\Local\Temp\my5.exe
            "C:\Users\Admin\AppData\Local\Temp\my5.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Local\Temp\my5.exe
              C:\Users\Admin\AppData\Local\Temp\my5.exe
              6⤵
              • Adds policy Run key to start application
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4960
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5064
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                  8⤵
                  • Modifies firewall policy service
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:1952
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\my5.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\my5.exe:*:Enabled:Windows Messanger" /f
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4648
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\my5.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\my5.exe:*:Enabled:Windows Messanger" /f
                  8⤵
                  • Modifies firewall policy service
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:752
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4836
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                  8⤵
                  • Modifies firewall policy service
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:3276
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\TBGJFDZANK.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\TBGJFDZANK.exe:*:Enabled:Windows Messanger" /f
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4988
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\TBGJFDZANK.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\TBGJFDZANK.exe:*:Enabled:Windows Messanger" /f
                  8⤵
                  • Modifies firewall policy service
                  • System Location Discovery: System Language Discovery
                  • Modifies registry key
                  PID:2860

Network

  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.ax-0001.ax-msedge.net
    g-bing-com.ax-0001.ax-msedge.net
    IN CNAME
    ax-0001.ax-msedge.net
    ax-0001.ax-msedge.net
    IN A
    150.171.27.10
    ax-0001.ax-msedge.net
    IN A
    150.171.28.10
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=00AB245C81636C4328D1314E80656DCC; domain=.bing.com; expires=Sun, 02-Nov-2025 23:10:05 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: C0C988FB5A64478FB10BC470B2C1E174 Ref B: LON601060107029 Ref C: 2024-10-08T23:10:05Z
    date: Tue, 08 Oct 2024 23:10:04 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=00AB245C81636C4328D1314E80656DCC
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=SSy9K6ycnl0F6jmSJbpD146vR3AFZX52iSjLyRmtW7c; domain=.bing.com; expires=Sun, 02-Nov-2025 23:10:05 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 9BAD4F10A97A4B9F87FF1788DDCA4762 Ref B: LON601060107029 Ref C: 2024-10-08T23:10:05Z
    date: Tue, 08 Oct 2024 23:10:04 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=
    Remote address:
    150.171.27.10:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=00AB245C81636C4328D1314E80656DCC; MSPTC=SSy9K6ycnl0F6jmSJbpD146vR3AFZX52iSjLyRmtW7c
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 82CEFAD0515440539130AD9D7F5FB1EA Ref B: LON601060107029 Ref C: 2024-10-08T23:10:05Z
    date: Tue, 08 Oct 2024 23:10:04 GMT
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    17.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    17.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    1eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    1eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    2eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    2eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    101.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    101.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    3eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    3eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    4eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    4eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    0.205.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.205.248.87.in-addr.arpa
    IN PTR
    Response
    0.205.248.87.in-addr.arpa
    IN PTR
    https-87-248-205-0lgwllnwnet
  • flag-us
    DNS
    11.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    11.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    5eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    5eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    6eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    6eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    7eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    7eragondaboss.zapto.org
    IN A
    Response
  • flag-us
    DNS
    8eragondaboss.zapto.org
    my5.exe
    Remote address:
    8.8.8.8:53
    Request
    8eragondaboss.zapto.org
    IN A
    Response
  • 150.171.27.10:443
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=
    tls, http2
    2.0kB
    9.4kB
    22
    19

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=44c3d09f1b0b4d9fa4a1c3a5ceb821b9&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=

    HTTP Response

    204
  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    148 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    150.171.27.10
    150.171.28.10

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    17.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    17.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    88.156.103.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    88.156.103.20.in-addr.arpa

  • 8.8.8.8:53
    eragondaboss.zapto.org
    dns
    my5.exe
    68 B
    128 B
    1
    1

    DNS Request

    eragondaboss.zapto.org

  • 8.8.8.8:53
    eragondaboss.zapto.org
    dns
    my5.exe
    68 B
    128 B
    1
    1

    DNS Request

    eragondaboss.zapto.org

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    1eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    1eragondaboss.zapto.org

  • 8.8.8.8:53
    2eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    2eragondaboss.zapto.org

  • 8.8.8.8:53
    101.209.201.84.in-addr.arpa
    dns
    73 B
    133 B
    1
    1

    DNS Request

    101.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    3eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    3eragondaboss.zapto.org

  • 8.8.8.8:53
    4eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    4eragondaboss.zapto.org

  • 8.8.8.8:53
    0.205.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    0.205.248.87.in-addr.arpa

  • 8.8.8.8:53
    11.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    11.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    5eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    5eragondaboss.zapto.org

  • 8.8.8.8:53
    6eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    6eragondaboss.zapto.org

  • 8.8.8.8:53
    7eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    7eragondaboss.zapto.org

  • 8.8.8.8:53
    8eragondaboss.zapto.org
    dns
    my5.exe
    69 B
    129 B
    1
    1

    DNS Request

    8eragondaboss.zapto.org

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\my5.exe

    Filesize

    472KB

    MD5

    5ffb0ae3c260b8cabda4d97a3cfc5db6

    SHA1

    7632fecdedab428752158ab5515234691a08103a

    SHA256

    58910765ee0ba0ef898b12e57789f447010b6cf2b22c97672f8029ee1caa2c88

    SHA512

    e5cc86be98bed8c508d1ecb7a7f6cb25fe0b7794b204587912698b3cb5c332f666d321f3b200ace286ff174c6355464cba1f68857ca9efb7eda6709e38a31f3b

  • memory/216-22-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/216-9-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/216-12-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/552-29-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/552-38-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/552-26-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/552-23-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3628-16-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3628-19-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3628-18-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/3628-39-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/4892-10-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/4892-3-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/4892-5-0x0000000000400000-0x00000000004FF000-memory.dmp

    Filesize

    1020KB

  • memory/4960-44-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-46-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-52-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-53-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-57-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4960-61-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/5048-0-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5048-6-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.