Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 23:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
Resource
win10v2004-20241007-en
General
-
Target
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
-
Size
527KB
-
MD5
0766745a1e47110b99674de3b2a8bb00
-
SHA1
fcbe357415a4505ad02c92bfe4e28cc2372d9bea
-
SHA256
fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055
-
SHA512
4a3bf06cc1169cc41b474763cd2fcfa4ac2b7f044ceb0b05982501b492570652efa07e98339f8ea8e26717306d04b3dcabca360968e3a1190c5501388a2d933d
-
SSDEEP
12288:1f09ZppPNIuu5wU/bK9sRarTjl0fCOQmlKdXeWlv9u3EN:1SpVT87aD+fCOQmlH
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7013350856:AAEMW-L9OH6xJPBSHadxtnabC3gFbH_e250/sendMessage?chat_id=7239159003
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/4656-11-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3200 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4656 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 3200 powershell.exe 3200 powershell.exe 4656 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4656 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe Token: SeDebugPrivilege 3200 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 636 wrote to memory of 3200 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 86 PID 636 wrote to memory of 3200 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 86 PID 636 wrote to memory of 3200 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 86 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 PID 636 wrote to memory of 4656 636 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe"C:\Users\Admin\AppData\Local\Temp\fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe"C:\Users\Admin\AppData\Local\Temp\fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4656
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.ax-0001.ax-msedge.netg-bing-com.ax-0001.ax-msedge.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=03D10A8DF6E866BC10E71F9EF7EE6758; domain=.bing.com; expires=Mon, 03-Nov-2025 23:55:24 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7F211528252F49918C6E92BD1F33FE39 Ref B: LON601060108023 Ref C: 2024-10-09T23:55:24Z
date: Wed, 09 Oct 2024 23:55:23 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=03D10A8DF6E866BC10E71F9EF7EE6758
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=7y8fjk-WgLR1r9GliAjQfjlabArHShPLt-j3299h-rY; domain=.bing.com; expires=Mon, 03-Nov-2025 23:55:24 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5631BB7C3127444BB21453836636D5B0 Ref B: LON601060108023 Ref C: 2024-10-09T23:55:24Z
date: Wed, 09 Oct 2024 23:55:23 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=03D10A8DF6E866BC10E71F9EF7EE6758; MSPTC=7y8fjk-WgLR1r9GliAjQfjlabArHShPLt-j3299h-rY
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DCFE0FC3DDE74FA3BF61C81803FA22FA Ref B: LON601060108023 Ref C: 2024-10-09T23:55:24Z
date: Wed, 09 Oct 2024 23:55:23 GMT
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcheckip.dyndns.orgIN AResponsecheckip.dyndns.orgIN CNAMEcheckip.dyndns.comcheckip.dyndns.comIN A193.122.130.0checkip.dyndns.comIN A132.226.8.169checkip.dyndns.comIN A158.101.44.242checkip.dyndns.comIN A193.122.6.168checkip.dyndns.comIN A132.226.247.73
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: 9d5638f7e8cb6cc504d1bedecea20f74
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: 41705b25844f17b4b0e3a81bcace0520
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: db40a60cbc4ba4058fd45259eaf1b21a
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: d62dbc7818dc103be67bca450b7e1034
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: eddbea97af5328c28e59a80a1387fd35
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: 046bab46d284594036bb4d72fb488b02
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: 11e758b8223aa2005044cdddda7ffe73
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: b6303e8fffdaad46627c9652fc393950
-
GEThttp://checkip.dyndns.org/fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:193.122.130.0:80RequestGET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
Host: checkip.dyndns.org
ResponseHTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 105
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
X-Request-ID: 803018ed3e8993f45919277cfd6d3a60
-
Remote address:8.8.8.8:53Requestreallyfreegeoip.orgIN AResponsereallyfreegeoip.orgIN A172.67.177.134reallyfreegeoip.orgIN A104.21.67.152
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23142
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s9RES%2B3tsv50MtazxYOORd1y1Oi%2Fiwv2irxbP7vCNCF%2FP6DxZ93P%2BNzcy0BbDEus4emSD6%2B9hi9MKnHvm98DwDILRyW8q3CZKmB65QcBds%2Bq4pr5vi7%2F68CnYkOZHREGMHnv7kdh"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d78e9948867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23142
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9854qazXYHvdYKaFuNCO%2FnlEDAv3Eav0EB3oFsVgjZvxCERc1d3%2BBLTHa998MVVaUtsiyiQvgYTaI%2BIEEHqXjdNzz6R78qU4c4fYxgPuMn3E8yBYTo5uxhKfcd%2FNLj9dEDtxrh6W"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7a0a448867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NSUrvBNT5xjS5hhn2BpLzInKN%2F0w8S%2BAYEV4kGC8Wkn%2FozxkrmQeCML%2Fk%2FbSsUAkdnPrksXOWz8nj2U2kTWgXfPetVXAAYPHUI2z28NWxbqdgduFCaAdxZgdVSG4FTGeueJ%2BRg4h"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7b2b228867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i%2BJ%2F6yDF4VKkJtJO7pD3l8iimMZh01WPklbZoy8ivU%2F480sOwneDvLmcLnNCWqA99h31m7nu34c1Fn1Qs19pCuK4Xwx6Z0aHETFOLUr6ZFHVVSeSjp%2FMvnO%2BMAaOI8dhSnxgYbXK"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7c3bbd8867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mjAxGerUzOH%2FD1jw4PjnraAK%2F1Mxsa3Z0aILbinZre%2FgOq3%2Ftar9rh%2F4YCkuUsyY%2FUx1l6GcYA43PiTqLR0FL9wA%2BZYAhh%2BoWZCUzJzgZWXc8c96A1efO64dFqXfA0ZXfxZ8WSE0"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7d5c518867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cbtgD5WxnHnN3qauau%2BIilpoF0OuwuWx4AC0e6GI39nZKo3xk9Wau%2B1EMKEDpYa5%2Fk51UzY2ohXqPudApGP2HPOSI2BugdzJHRJ2LZID%2Fmmh2r5JL8zFyp6ZbIrhGrXoyvYI6czp"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7e7cdc8867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9tVDIR%2FOV1r7xjRrvJgvzOKw2Mrf9udf2NCLkpZgu5SFO%2FIfx%2BgneZVJ9%2FFHB8S25RWNF0al7A%2BksJ3NgVigekOsANK1oS20%2BsF0mJKycSpEremAJDnmNaeN39va0U2zoA5G1T3i"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d7f7d658867-LHR
alt-svc: h3=":443"; ma=86400
-
GEThttps://reallyfreegeoip.org/xml/138.199.29.44fc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exeRemote address:172.67.177.134:443RequestGET /xml/138.199.29.44 HTTP/1.1
Host: reallyfreegeoip.org
ResponseHTTP/1.1 200 OK
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
access-control-allow-origin: *
vary: Accept-Encoding
Cache-Control: max-age=86400
CF-Cache-Status: HIT
Age: 23143
Last-Modified: Wed, 09 Oct 2024 17:29:55 GMT
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OyA6beAhy9TmAhby18KBvFDV%2BpqUvk38HJcMnbe9tRDEPBNrAqF8e0W%2B69Rj3CYly2L2OyiDF%2BRuS2GbHhkFTc3jeLjln7AfXo3Eso754Sk3v55pzscKxVpUKwOz8fzMnc8gj2lE"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8d024d809e178867-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request0.130.122.193.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request134.177.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request212.20.149.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
150.171.27.10:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=tls, http22.0kB 9.4kB 21 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=eb54a13ec48a4c488c7f5b5da1227016&localId=w:54ECD007-E294-A159-E37D-CA55023ED6B0&deviceId=6966572651497155&anid=HTTP Response
204 -
193.122.130.0:80http://checkip.dyndns.org/httpfc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe1.9kB 3.8kB 16 14
HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200HTTP Request
GET http://checkip.dyndns.org/HTTP Response
200 -
172.67.177.134:443https://reallyfreegeoip.org/xml/138.199.29.44tls, httpfc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe2.0kB 12.7kB 23 23
HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200HTTP Request
GET https://reallyfreegeoip.org/xml/138.199.29.44HTTP Response
200
-
56 B 148 B 1 1
DNS Request
g.bing.com
DNS Response
150.171.27.10150.171.28.10
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
8.8.8.8:53checkip.dyndns.orgdnsfc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe64 B 176 B 1 1
DNS Request
checkip.dyndns.org
DNS Response
193.122.130.0132.226.8.169158.101.44.242193.122.6.168132.226.247.73
-
8.8.8.8:53reallyfreegeoip.orgdnsfc22cdf353ad4a36ab7d22310eaec07551dc84fcdd8d6d58b139d5f672097055N.exe65 B 97 B 1 1
DNS Request
reallyfreegeoip.org
DNS Response
172.67.177.134104.21.67.152
-
72 B 146 B 1 1
DNS Request
0.130.122.193.in-addr.arpa
-
73 B 135 B 1 1
DNS Request
134.177.67.172.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
212.20.149.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82