Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:23 UTC
Static task
static1
Behavioral task
behavioral1
Sample
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe
Resource
win10v2004-20241007-en
General
-
Target
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe
-
Size
777KB
-
MD5
0367a4874aeba4b3ecbfb20b7f455b31
-
SHA1
77582a1b5b5bbfe7c1ae0af51cdc9472d57108fe
-
SHA256
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0
-
SHA512
a46e85ba514c257b04535c7bb1a274a595ddb56c5835db451b08e4196280d9d4ef392a4ffcf89b2ccd3eef023acc7235b7b252b25e96688ae885ac87865d6585
-
SSDEEP
24576:4ypsjaWOH4r5U71yt8EojxjBINTrn8IrfSH:/2JFU78iEy9wh
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca1-20.dat healer behavioral1/memory/4968-22-0x0000000000530000-0x000000000053A000-memory.dmp healer behavioral1/memory/3560-29-0x00000000008A0000-0x00000000008BA000-memory.dmp healer behavioral1/memory/3560-31-0x0000000002370000-0x0000000002388000-memory.dmp healer behavioral1/memory/3560-59-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-57-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-55-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-53-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-51-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-47-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-37-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-45-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-43-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-41-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-39-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-49-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-35-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-33-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-32-0x0000000002370000-0x0000000002382000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3502WR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h97Lc81.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3128-67-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/3128-68-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/3128-70-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-80-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-102-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-100-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-98-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-94-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-90-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-88-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-86-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-84-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-82-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-78-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-76-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-74-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-72-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-96-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-92-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-69-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4576 niba5711.exe 524 niba0003.exe 4968 f3502WR.exe 3560 h97Lc81.exe 3128 iDdKj02.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3502WR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h97Lc81.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba5711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba0003.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 632 3560 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba0003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h97Lc81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iDdKj02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba5711.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4968 f3502WR.exe 4968 f3502WR.exe 3560 h97Lc81.exe 3560 h97Lc81.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4968 f3502WR.exe Token: SeDebugPrivilege 3560 h97Lc81.exe Token: SeDebugPrivilege 3128 iDdKj02.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 524 wrote to memory of 4968 524 niba0003.exe 89 PID 524 wrote to memory of 4968 524 niba0003.exe 89 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe"C:\Users\Admin\AppData\Local\Temp\705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba0003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba0003.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3502WR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3502WR.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h97Lc81.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h97Lc81.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 10845⤵
- Program crash
PID:632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iDdKj02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iDdKj02.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3560 -ip 35601⤵PID:3008
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.ax-0001.ax-msedge.netg-bing-com.ax-0001.ax-msedge.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=02C12BDAB002675B39FB3EF7B1C066EC; domain=.bing.com; expires=Sat, 29-Nov-2025 14:23:30 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D9E42AB16DAC45D6B39D2F5EFB386244 Ref B: LON601060105029 Ref C: 2024-11-04T14:23:30Z
date: Mon, 04 Nov 2024 14:23:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=02C12BDAB002675B39FB3EF7B1C066EC
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=71ntK3lrz_fs6vSpTt9B28HmNeRXeMWd4y-2pSTkhKE; domain=.bing.com; expires=Sat, 29-Nov-2025 14:23:30 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DB245D726E884129BC3192DF4E7A0DD6 Ref B: LON601060105029 Ref C: 2024-11-04T14:23:30Z
date: Mon, 04 Nov 2024 14:23:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=Remote address:150.171.27.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=02C12BDAB002675B39FB3EF7B1C066EC; MSPTC=71ntK3lrz_fs6vSpTt9B28HmNeRXeMWd4y-2pSTkhKE
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D3935443A82244C18ABA77F7D10D7E9F Ref B: LON601060105029 Ref C: 2024-11-04T14:23:30Z
date: Mon, 04 Nov 2024 14:23:30 GMT
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301058_17JUKZU9RAC77URQ8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301058_17JUKZU9RAC77URQ8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 514312
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8BC143B1A7E94F5D9BB811EE2B3DA324 Ref B: LON601060104023 Ref C: 2024-11-04T14:25:10Z
date: Mon, 04 Nov 2024 14:25:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 746576
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6E1A2D63BC0945CB8DAEB48875648464 Ref B: LON601060104023 Ref C: 2024-11-04T14:25:10Z
date: Mon, 04 Nov 2024 14:25:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418549_1ZU8FEFK0ERHP4923&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418549_1ZU8FEFK0ERHP4923&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 435187
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4F6DE8BBC3E442F29265F50C32AB95B9 Ref B: LON601060104023 Ref C: 2024-11-04T14:25:10Z
date: Mon, 04 Nov 2024 14:25:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418550_1B8YD3DMBL24NYO16&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418550_1B8YD3DMBL24NYO16&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 657438
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BCD24D824BE243158E2ED7000D79A79B Ref B: LON601060104023 Ref C: 2024-11-04T14:25:10Z
date: Mon, 04 Nov 2024 14:25:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 490098
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6146B52C5A654C1181D607B217494779 Ref B: LON601060104023 Ref C: 2024-11-04T14:25:10Z
date: Mon, 04 Nov 2024 14:25:10 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301491_1LL1FHWSDTTTRGIZC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301491_1LL1FHWSDTTTRGIZC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 422407
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 17EC64434D414B92B12FFD9F7A67DCE9 Ref B: LON601060104023 Ref C: 2024-11-04T14:25:11Z
date: Mon, 04 Nov 2024 14:25:11 GMT
-
150.171.27.10:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=tls, http22.0kB 9.4kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=dc6c54a6d0e1401fbf714a7cc365fd9a&localId=w:47999119-06B9-CF8D-8780-3C81959A9B6E&deviceId=6755476188931877&anid=HTTP Response
204 -
260 B 5
-
260 B 5
-
260 B 5
-
1.2kB 6.9kB 15 13
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239317301491_1LL1FHWSDTTTRGIZC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2116.3kB 3.4MB 2456 2450
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301058_17JUKZU9RAC77URQ8&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360432410_1ZT9L3WG863INPZDE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418549_1ZU8FEFK0ERHP4923&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418550_1B8YD3DMBL24NYO16&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360432411_13QPWJ00JGY7I4CI1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301491_1LL1FHWSDTTTRGIZC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200 -
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
260 B 5
-
208 B 4
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
56 B 148 B 1 1
DNS Request
g.bing.com
DNS Response
150.171.27.10150.171.28.10
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
104.219.191.52.in-addr.arpa
DNS Request
104.219.191.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD502e4913546ccdf8bfc8f80daa8ae0463
SHA18e9ed3851ea59dc646cc1fb5a9686d0b1ebabfee
SHA2560d2aeab589e66bc2af8825e0e0449d8762ad3586c753f2a3b8ef9071a9338f29
SHA51284d3d4f1bc04464d95abbc83690bac279a628adf02bdc62bcb2767a5d3d8b5f69d5446e4596c793d7d173bd32ba56737e09edfeb32ff5cfdd19223a59c730349
-
Filesize
287KB
MD5a8b7dd84ddda5bd29f9e1a6de036feea
SHA1243a1d14e714a46b1a0a66e6cd20cd3a76aa163d
SHA256ec566375190f3ec7438a9dd6474b2f75a515ca51e70686b7d4ace9daec33b658
SHA5128e8cfa700cfdbc217ebe36c639cca0e246730ce3e6cbbc289dab8fbc3cf602218340b717a1112b1ba299098dd62edeb500cd4ca65ae4d55314e5ceadd34a7919
-
Filesize
314KB
MD5617d48d250a9832865b48d565a696fba
SHA171cad04bdae0b21743c6fed69e080618003732f8
SHA256ef756b45b6d465f94f914bbcad3e0e793e69bf10c737e7ca102363ad5ebd4e65
SHA512fed804cfff1b53a5053fa7fb592cf6a3912f89e381427f5461e24c6a8779ec1de8b788db0c21954b720bdf3dc6383c425d4e9ae88c308202ba5063c3c1e97ce1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD5c5013f742c2f23d212033ba2fab5e36a
SHA1064cb4f934280ecad09b73b2eaaf180e57daf267
SHA2562e8f7fb3e1f60c242e3345c0ebca7d24b4613a4f2bcc8b7aab964dfc544946bc
SHA512c5c4e062a6ecef324c2070fb60daa07a40cda370634a66f35b5666d8e65041091b269b97ce3df8466b0a378d5b5a9b6d273ba5a4b9c06e3801311e35c92e1e88