Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 17:19 UTC

General

  • Target

    medk.msi

  • Size

    2.0MB

  • MD5

    8cb04bf931a19fa0ae1bd7235180dd4a

  • SHA1

    dfc980a827dbde294ae9fa6e63545d1d57344e96

  • SHA256

    dfff1a07429ff9585f3dab9c78b501174e7c326e1fb95c5234368071b5426768

  • SHA512

    58f1661d689aaa9391f04e086db490693f83b70e068ca10b20cff6f87979a8804aa9f054ac961af06c4b7b17fd88b1912774b2eb3d16b9df8e7a4ed9bb3c0a29

  • SSDEEP

    49152:F943YhW8zBQSc0ZnSKBZKumZr7Apj3Y+7jHplNa:6YY0Zn3K/Al3dXHpra

Malware Config

Extracted

Family

latrodectus

C2

https://rolefenik.com/test/

https://ergiholim.com/test/

Signatures

  • Detects Latrodectus 3 IoCs

    Detects Latrodectus v1.4.

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Blocklisted process makes network request 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    PID:3488
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\medk.msi
      2⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2460
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Roaming\tab.dll, Object
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Roaming\tab.dll, Object
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5000
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4376
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 28AA28B5223B9BD06D95BBB64E3112EB
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4496
    • C:\Windows\Installer\MSIAC43.tmp
      "C:\Windows\Installer\MSIAC43.tmp" /DontWait C:/Windows/SysWOW64/rundll32.exe C:\Users\Admin\AppData\Roaming\tab.dll, Object
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:432
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3816

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    196.249.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    196.249.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    99.209.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    99.209.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    57.110.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.110.18.2.in-addr.arpa
    IN PTR
    Response
    57.110.18.2.in-addr.arpa
    IN PTR
    a2-18-110-57deploystaticakamaitechnologiescom
  • flag-us
    DNS
    154.239.44.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    154.239.44.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    samomol.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    samomol.com
    IN A
    Response
    samomol.com
    IN A
    87.120.37.120
  • flag-bg
    POST
    https://samomol.com:9043/pankihoy.php
    rundll32.exe
    Remote address:
    87.120.37.120:9043
    Request
    POST /pankihoy.php HTTP/1.1
    joy_Te9en9eK9ax9Nei3zux9: division_diewi9uKuo4tob4tei3i
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.119 Safari/537.36
    Host: samomol.com:9043
    Content-Length: 544
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html
    Date: Wed, 13 Nov 2024 17:19:27 GMT
    Joy_te9en9ek9ax9nei3zux9: division_diewi9uKuo4tob4tei3i
    Content-Length: 52
  • flag-us
    DNS
    120.37.120.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    120.37.120.87.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    120.37.120.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    120.37.120.87.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    120.37.120.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    120.37.120.87.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    r11.o.lencr.org
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    r11.o.lencr.org
    IN A
    Response
    r11.o.lencr.org
    IN CNAME
    o.lencr.edgesuite.net
    o.lencr.edgesuite.net
    IN CNAME
    a1887.dscq.akamai.net
    a1887.dscq.akamai.net
    IN A
    88.221.134.137
    a1887.dscq.akamai.net
    IN A
    88.221.134.89
  • flag-gb
    GET
    http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgMM8xqWPzJlR4d3NX4FLeCQHw%3D%3D
    rundll32.exe
    Remote address:
    88.221.134.137:80
    Request
    GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgMM8xqWPzJlR4d3NX4FLeCQHw%3D%3D HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: r11.o.lencr.org
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/ocsp-response
    Content-Length: 504
    ETag: "7DDA9A3DEBFA76400682284A5D1DA11037FC52B9E30352DF909191B94C5E783B"
    Last-Modified: Wed, 13 Nov 2024 11:29:00 UTC
    Cache-Control: public, no-transform, must-revalidate, max-age=21336
    Expires: Wed, 13 Nov 2024 23:15:02 GMT
    Date: Wed, 13 Nov 2024 17:19:26 GMT
    Connection: keep-alive
  • flag-us
    DNS
    168.245.100.95.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    168.245.100.95.in-addr.arpa
    IN PTR
    Response
    168.245.100.95.in-addr.arpa
    IN PTR
    a95-100-245-168deploystaticakamaitechnologiescom
  • flag-us
    DNS
    137.134.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    137.134.221.88.in-addr.arpa
    IN PTR
    Response
    137.134.221.88.in-addr.arpa
    IN PTR
    a88-221-134-137deploystaticakamaitechnologiescom
  • flag-bg
    POST
    https://samomol.com:9043/pankihoy.php
    rundll32.exe
    Remote address:
    87.120.37.120:9043
    Request
    POST /pankihoy.php HTTP/1.1
    joy_Te9en9eK9ax9Nei3zux9: division_diewi9uKuo4tob4tei3i
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.119 Safari/537.36
    Host: samomol.com:9043
    Content-Length: 154
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html
    Date: Wed, 13 Nov 2024 17:19:27 GMT
    Joy_te9en9ek9ax9nei3zux9: division_diewi9uKuo4tob4tei3i
    Content-Length: 204760
  • flag-us
    DNS
    212.20.149.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    212.20.149.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.135.221.88.in-addr.arpa
    IN PTR
    Response
    217.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-217deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-bg
    POST
    https://samomol.com:9043/matrix.php
    rundll32.exe
    Remote address:
    87.120.37.120:9043
    Request
    POST /matrix.php HTTP/1.1
    joy_Te9en9eK9ax9Nei3zux9: division_diewi9uKuo4tob4tei3i
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.119 Safari/537.36
    Host: samomol.com:9043
    Content-Length: 220
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html
    Date: Wed, 13 Nov 2024 17:20:20 GMT
    Joy_te9en9ek9ax9nei3zux9: division_diewi9uKuo4tob4tei3i
    Content-Length: 0
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    burjog.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    burjog.com
    IN A
    Response
    burjog.com
    IN A
    45.143.166.230
  • flag-us
    DNS
    burjog.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    burjog.com
    IN A
    Response
  • flag-ru
    POST
    https://burjog.com:9043/pankihoy.php
    rundll32.exe
    Remote address:
    45.143.166.230:9043
    Request
    POST /pankihoy.php HTTP/1.1
    joy_Te9en9eK9ax9Nei3zux9: division_diewi9uKuo4tob4tei3i
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.119 Safari/537.36
    Host: burjog.com:9043
    Content-Length: 444
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html
    Date: Wed, 13 Nov 2024 17:20:54 GMT
    Joy_te9en9ek9ax9nei3zux9: division_diewi9uKuo4tob4tei3i
    Content-Length: 0
  • flag-us
    DNS
    r11.o.lencr.org
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    r11.o.lencr.org
    IN A
    Response
    r11.o.lencr.org
    IN CNAME
    o.lencr.edgesuite.net
    o.lencr.edgesuite.net
    IN CNAME
    a1887.dscq.akamai.net
    a1887.dscq.akamai.net
    IN A
    88.221.134.89
    a1887.dscq.akamai.net
    IN A
    88.221.134.137
  • flag-gb
    GET
    http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgOjnhIuzFsRtAt3o5qMxjL2lA%3D%3D
    rundll32.exe
    Remote address:
    88.221.134.89:80
    Request
    GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgOjnhIuzFsRtAt3o5qMxjL2lA%3D%3D HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/10.0
    Host: r11.o.lencr.org
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/ocsp-response
    Content-Length: 504
    ETag: "898F23C24F04204544F07B73E0F760952A9B797FC44F4DD8379D550F1F3EFF54"
    Last-Modified: Wed, 13 Nov 2024 05:43:00 UTC
    Cache-Control: public, no-transform, must-revalidate, max-age=18479
    Expires: Wed, 13 Nov 2024 22:28:52 GMT
    Date: Wed, 13 Nov 2024 17:20:53 GMT
    Connection: keep-alive
  • flag-us
    DNS
    230.166.143.45.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    230.166.143.45.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    89.134.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    89.134.221.88.in-addr.arpa
    IN PTR
    Response
    89.134.221.88.in-addr.arpa
    IN PTR
    a88-221-134-89deploystaticakamaitechnologiescom
  • flag-ru
    POST
    https://burjog.com:9043/neo.php
    rundll32.exe
    Remote address:
    45.143.166.230:9043
    Request
    POST /neo.php HTTP/1.1
    joy_Te9en9eK9ax9Nei3zux9: division_diewi9uKuo4tob4tei3i
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.119 Safari/537.36
    Host: burjog.com:9043
    Content-Length: 154
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: text/html
    Date: Wed, 13 Nov 2024 17:21:33 GMT
    Joy_te9en9ek9ax9nei3zux9: division_diewi9uKuo4tob4tei3i
    Content-Length: 0
  • 87.120.37.120:9043
    https://samomol.com:9043/pankihoy.php
    tls, http
    rundll32.exe
    2.7kB
    3.9kB
    14
    11

    HTTP Request

    POST https://samomol.com:9043/pankihoy.php

    HTTP Response

    200
  • 88.221.134.137:80
    http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgMM8xqWPzJlR4d3NX4FLeCQHw%3D%3D
    http
    rundll32.exe
    568 B
    1.1kB
    7
    5

    HTTP Request

    GET http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgMM8xqWPzJlR4d3NX4FLeCQHw%3D%3D

    HTTP Response

    200
  • 87.120.37.120:9043
    https://samomol.com:9043/pankihoy.php
    tls, http
    rundll32.exe
    8.2kB
    211.8kB
    160
    159

    HTTP Request

    POST https://samomol.com:9043/pankihoy.php

    HTTP Response

    200
  • 87.120.37.120:9043
    https://samomol.com:9043/matrix.php
    tls, http
    rundll32.exe
    1.3kB
    562 B
    7
    6

    HTTP Request

    POST https://samomol.com:9043/matrix.php

    HTTP Response

    200
  • 45.143.166.230:9043
    https://burjog.com:9043/pankihoy.php
    tls, http
    rundll32.exe
    1.5kB
    3.7kB
    10
    8

    HTTP Request

    POST https://burjog.com:9043/pankihoy.php

    HTTP Response

    200
  • 88.221.134.89:80
    http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgOjnhIuzFsRtAt3o5qMxjL2lA%3D%3D
    http
    rundll32.exe
    424 B
    1.0kB
    4
    3

    HTTP Request

    GET http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgOjnhIuzFsRtAt3o5qMxjL2lA%3D%3D

    HTTP Response

    200
  • 45.143.166.230:9043
    https://burjog.com:9043/neo.php
    tls, http
    rundll32.exe
    1.2kB
    522 B
    7
    5

    HTTP Request

    POST https://burjog.com:9043/neo.php

    HTTP Response

    200
  • 192.229.221.95:80
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    132 B
    90 B
    2
    1

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    196.249.167.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    196.249.167.52.in-addr.arpa

  • 8.8.8.8:53
    99.209.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    99.209.201.84.in-addr.arpa

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    57.110.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    57.110.18.2.in-addr.arpa

  • 8.8.8.8:53
    154.239.44.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    154.239.44.20.in-addr.arpa

  • 8.8.8.8:53
    samomol.com
    dns
    rundll32.exe
    57 B
    73 B
    1
    1

    DNS Request

    samomol.com

    DNS Response

    87.120.37.120

  • 8.8.8.8:53
    120.37.120.87.in-addr.arpa
    dns
    216 B
    128 B
    3
    1

    DNS Request

    120.37.120.87.in-addr.arpa

    DNS Request

    120.37.120.87.in-addr.arpa

    DNS Request

    120.37.120.87.in-addr.arpa

  • 8.8.8.8:53
    r11.o.lencr.org
    dns
    rundll32.exe
    61 B
    160 B
    1
    1

    DNS Request

    r11.o.lencr.org

    DNS Response

    88.221.134.137
    88.221.134.89

  • 8.8.8.8:53
    168.245.100.95.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    168.245.100.95.in-addr.arpa

  • 8.8.8.8:53
    137.134.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    137.134.221.88.in-addr.arpa

  • 8.8.8.8:53
    212.20.149.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    212.20.149.52.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    217.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    217.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    burjog.com
    dns
    rundll32.exe
    112 B
    128 B
    2
    2

    DNS Request

    burjog.com

    DNS Request

    burjog.com

    DNS Response

    45.143.166.230

  • 8.8.8.8:53
    r11.o.lencr.org
    dns
    rundll32.exe
    61 B
    160 B
    1
    1

    DNS Request

    r11.o.lencr.org

    DNS Response

    88.221.134.89
    88.221.134.137

  • 8.8.8.8:53
    230.166.143.45.in-addr.arpa
    dns
    73 B
    140 B
    1
    1

    DNS Request

    230.166.143.45.in-addr.arpa

  • 8.8.8.8:53
    89.134.221.88.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    89.134.221.88.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57a76e.rbs

    Filesize

    1KB

    MD5

    0f8072066d82d7402094b239c5f3283b

    SHA1

    24f7913cad4302f796ed621313fa171b0595b521

    SHA256

    ee9f5e85020c9cec0d83b4aad60556642edf846fa6e807d3ce3cf165415a58ad

    SHA512

    b443e94046f4477ce67975c97056fd71647091a508843d7058e211b8662411f90cf4ce159c5b0582c3c73551d6119d0dbca7871c072f12e9e6f353bf70fbb18f

  • C:\Users\Admin\AppData\Roaming\tab.dll

    Filesize

    1.6MB

    MD5

    4f4a164b5f9ef20be601531a727179a2

    SHA1

    1601622dc7caef28ce413e1d73b4d4596aabfc50

    SHA256

    0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306

    SHA512

    de09d9f0048a19c7efa7ffae01f58c41e619e09e6ec56e4b818b58846672a0772c58913ba5ad4c86b746d91399894a21bf51225c1737a0652b1c85ffa3307030

  • C:\Windows\Installer\MSIA7B9.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSIAC43.tmp

    Filesize

    389KB

    MD5

    b9545ed17695a32face8c3408a6a3553

    SHA1

    f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

    SHA256

    1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

    SHA512

    f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    24.1MB

    MD5

    667086549b26d9018b35d1340eb0847b

    SHA1

    1be230022d75a198a3afaf1c3b3545a03d4a199c

    SHA256

    3040e131f6f598e44c7951aaacd4e623ddf26488df4e368016d0ec93a0c7476e

    SHA512

    64a35573b0e7d49b68e86ed8ee75ead3fccf76f93411e39c50789b22b9999b5fc4943eb6fb26120f047979cc8264edce5ec69405d972d930202d140458469d07

  • \??\Volume{1541411d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c4f88144-7f04-4607-bc7a-8ff1ea06b40e}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    c6b1a10bda73ddaf1a08773e87b6d1b2

    SHA1

    279d506fdc957abd829801c0d4243cf2f056d6b1

    SHA256

    a8e29bb2fa9758300fb4631aaa026c3b15cb7adc8d0b7af7a4a44d2497e8f296

    SHA512

    7060b7ee1974e527e087460595b5ec1c968de4302ebc71fbda6b2bd82eacbc5c9669039521d2a94011f4c37ddb7e2d57f2bfd647437153064dbcdfc7ecd7b6c6

  • memory/3488-69-0x0000000002860000-0x0000000002875000-memory.dmp

    Filesize

    84KB

  • memory/3488-68-0x0000000002860000-0x0000000002875000-memory.dmp

    Filesize

    84KB

  • memory/5000-62-0x00007FF4389A0000-0x00007FF4389A1000-memory.dmp

    Filesize

    4KB

  • memory/5000-63-0x00007FF438980000-0x00007FF438995000-memory.dmp

    Filesize

    84KB

  • memory/5000-67-0x00007FF438940000-0x00007FF438941000-memory.dmp

    Filesize

    4KB

  • memory/5000-66-0x00007FF438950000-0x00007FF438951000-memory.dmp

    Filesize

    4KB

  • memory/5000-65-0x00007FF438960000-0x00007FF438961000-memory.dmp

    Filesize

    4KB

  • memory/5000-64-0x00007FF438970000-0x00007FF438971000-memory.dmp

    Filesize

    4KB

  • memory/5000-47-0x000001DF76320000-0x000001DF7636C000-memory.dmp

    Filesize

    304KB

  • memory/5000-75-0x000001DF76320000-0x000001DF7636C000-memory.dmp

    Filesize

    304KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.