Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10017b236bf3...d6.exe
windows7-x64
1005676f2007...fb.exe
windows7-x64
30a025116a8...57.exe
windows7-x64
81.exe
windows7-x64
818674bbd9a...38.exe
windows7-x64
8234901adb1...b2.exe
windows7-x64
102ae06537d1...b6.exe
windows7-x64
82c02c65090...91.exe
windows7-x64
73.exe
windows7-x64
10329b3ddbf1...f9.exe
windows7-x64
10336fe6e8bc...de.exe
windows7-x64
84bd31921c8...be.exe
windows7-x64
84e180437ef...a9.exe
windows7-x64
1539b0b5d54...05.exe
windows7-x64
1053bf3a0bff...35.exe
windows7-x64
8$PLUGINSDIR/INetC.dll
windows7-x64
35d63c27043...42.exe
windows7-x64
8$PLUGINSDIR/INetC.dll
windows7-x64
35d6e1eeab9...84.exe
windows7-x64
863136e1d44...b5.exe
windows7-x64
8658110c095...6f.exe
windows7-x64
874cafa4165...c5.exe
windows7-x64
888bf025119...30.exe
windows7-x64
59fbf62bd6a...a0.exe
windows7-x64
9a89591555b...df.exe
windows7-x64
10add230a2e7...10.exe
windows7-x64
10c83bf900eb...31.exe
windows7-x64
10ccbf53569b...71.exe
windows7-x64
8db725306e6...8b.exe
windows7-x64
10e035a1741d...5f.exe
windows7-x64
7e2f4dfe61d...f8.exe
windows7-x64
8f10e957b92...41.exe
windows7-x64
8Analysis
-
max time kernel
361s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 13:10 UTC
Behavioral task
behavioral1
Sample
017b236bf38a1cf9a52fc0bdee2d5f23f038b00f9811c8a58b8b66b1c756b8d6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
05676f20078a7802bf07f231105f60bcfc96a20830fb79db26afa570332f97fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
0a025116a860d7568fbda8ed84925cac06b13d6441eddf7428ac79359cd09b57.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
234901adb1100979c1e842133901f0bb8617683efeed4e3d56245f71f71aa6b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
2ae06537d1e90d4ac1d2bca7c6309c9d1958f3e1ae9d7625bd914b10609d41b6.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
2c02c650903a9cc289c62b83a56de001871b58531c4da3fc838a32b3b9e84291.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
3.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
329b3ddbf1c00b7767f0ec39b90eb9f4f8bd98ace60e2f6b6fbfb9adf25e3ef9.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
336fe6e8bcdbe46641a6124436547df8e1090d978e3777d220bfa7553c9903de.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
4bd31921c87104105a1f11a3cbe3a93bf74593220f70bf70f678d2d468c991be.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
539b0b5d54757e8a2b754ecdc2939eb7cf9db0ed1728e0eca407500222668505.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
53bf3a0bfff30e863442524c66ee7ca463b473a9fef5f472b71aa7d5f8216d35.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
5d63c27043f11cd292e997fdee614389929b9af339ea45ca15159478307ce642.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
5d6e1eeab943b8b0bdb575aa61ac5353a841c402b36d9b455bb7f0cce5207b84.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
63136e1d447b73dcb7405b6c7cbfcda31c705cfccaeef0e5df98c623520abfb5.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
658110c0956289e2b829f018e2322196327e3ab022406c77b4218f963f56ba6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
74cafa416573d3b31e6b4f01e70da21aa8c11f744f784278960b728b9c6208c5.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
88bf025119fde24e63bbc878cd06f5e8631a6c5fd6b066adc6d9c28c6ca3a230.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
9fbf62bd6afa7c3269c549b3deae512634f02151f1bed92ff70038b4bf0cf2a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
a89591555b9acb65353c2b854e582bc41db2fbc0eda2210b89a877d1862084df.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
add230a2e7aabf2ea909f641894d9febc6673cf23623a00ce3f47bc73ec9b310.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
c83bf900eb759e5de5c8b0697a101ce81573874a440ac07ae4ecbc56c4f69331.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
ccbf53569be6ca3b092de09ee3ee854c6481e5df8925d57ee4b4d9f0631fe371.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
db725306e6d15f5f339c2b5dc9c2daf7e11957e93e8cc9c71319c0a432e6358b.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
e035a1741d10a75402359dec278717e4e32b9d2a9ec1e1834710a2b67aa21f5f.exe
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
e2f4dfe61de56a38c2218b601ee3f3e49b8dbe8ece3e9d98cdf8358b41da5ff8.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
f10e957b92fbb2bb57e0a51eeda99dedb1b0720a1be0422b53404d3252bef741.exe
Resource
win7-20240903-en
General
-
Target
18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe
-
Size
96KB
-
MD5
9953c9961814c8e1c88346415dd208c2
-
SHA1
bb2daf108ac562e5163e74ba57278857f720d212
-
SHA256
18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438
-
SHA512
75985b7c5e41dda0bb83ac34338bedccd14c9deed13c983f8afa1afc083ebf55217aaa69e19c9a195faf8479c0ccbe55a384dbd15a2a44ba89971ac502767027
-
SSDEEP
3072:BCunH3YQ4TgvMvPQDeqgKJ+BCn2S6Q5aA:BCAX3vMvPQNgKL2S6Q5f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 6 IoCs
pid Process 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe 1740 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe"C:\Users\Admin\AppData\Local\Temp\18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1740
Network
-
Remote address:8.8.8.8:53Requestxetapp.comIN AResponsexetapp.comIN A82.146.50.198
-
GEThttps://xetapp.com/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xetapp.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 20 Nov 2024 13:10:42 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: https://xet.app/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya
-
Remote address:8.8.8.8:53Requestxet.appIN AResponsexet.appIN A82.146.50.198
-
GEThttps://xet.app/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xet.app
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Wed, 20 Nov 2024 13:10:42 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
GEThttps://xet.app/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xet.app
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Wed, 20 Nov 2024 13:10:43 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
GEThttps://xet.app/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=818674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xet.app
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Wed, 20 Nov 2024 13:10:50 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
GEThttps://xet.app/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=818674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xet.app
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Date: Wed, 20 Nov 2024 13:10:50 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
GEThttps://xetapp.com/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xetapp.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 20 Nov 2024 13:10:43 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: https://xet.app/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_ya
-
Remote address:8.8.8.8:53Requestdl.xetapp.usIN AResponsedl.xetapp.usIN A172.98.192.37
-
GEThttp://dl.xetapp.us/downloads/software/security/encryption/secret.disk.exe18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:172.98.192.37:80RequestGET /downloads/software/security/encryption/secret.disk.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: dl.xetapp.us
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
cache-control: max-age=0, private, must-revalidate
connection: close
content-length: 527
content-type: text/html; charset=utf-8
date: Wed, 20 Nov 2024 13:10:46 GMT
server: nginx
set-cookie: sid=db2f3ad8-a740-11ef-84c9-5c26890d6483; path=/; domain=.xetapp.us; expires=Mon, 08 Dec 2092 16:24:53 GMT; max-age=2147483647; HttpOnly
-
GEThttps://xetapp.com/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=818674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xetapp.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 20 Nov 2024 13:10:50 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: https://xet.app/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8
-
GEThttps://xetapp.com/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=818674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:82.146.50.198:443RequestGET /settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: xetapp.com
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Date: Wed, 20 Nov 2024 13:10:50 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: https://xet.app/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8
-
Remote address:8.8.8.8:53Requestdownload.yandex.ruIN AResponsedownload.yandex.ruIN CNAMEcdn.yandex.netcdn.yandex.netIN A5.45.205.242cdn.yandex.netIN A5.45.205.244cdn.yandex.netIN A5.45.205.245cdn.yandex.netIN A5.45.205.241cdn.yandex.netIN A5.45.205.243
-
GEThttp://download.yandex.ru/yandex-pack/downloader/downloader.exe18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:5.45.205.242:80RequestGET /yandex-pack/downloader/downloader.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: download.yandex.ru
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 302 Found
Date: Wed, 20 Nov 2024 13:10:51 GMT
Content-Length: 0
Connection: keep-alive
Keep-Alive: timeout=5
Location: http://cachev2-rad-05.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=309
X-Request-Id: 1732108251057973-9112290496667312549
X-Strm-Request-Id: 1732108251057973-9112290496667312549
X_h: strm-cacto-production-1.klg.yp-c.yandex.net
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Cache-Control: no-store,no-cache,must-revalidate
Pragma: no-cache
-
DNScachev2-rad-05.cdn.yandex.net18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:8.8.8.8:53Requestcachev2-rad-05.cdn.yandex.netIN AResponsecachev2-rad-05.cdn.yandex.netIN A5.45.192.12
-
GEThttp://cachev2-rad-05.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=30918674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exeRemote address:5.45.192.12:80RequestGET /download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=309 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: cachev2-rad-05.cdn.yandex.net
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Wed, 20 Nov 2024 13:10:51 GMT
Content-Type: application/octet-stream
Content-Length: 208544
Connection: keep-alive
Keep-Alive: timeout=60
Etag: "b9314504e592d42cb36534415a62b3af"
Last-Modified: Mon, 22 Jul 2024 09:35:20 GMT
X-Amz-Meta-Origin-Date-Iso8601: 2024-07-22T09:04:09.431Z
X-Amz-Request-Id: 5055470270556695
Access-Control-Allow-Origin: *
X-Robots-Tag: noindex, noarchive, nofollow
X-Strm-Log-Split: 7
X_h: cachev2-rad-05.cdn.yandex.net
X-Strm-Request-Id: faacad697c48adb6
X-Request-Id: faacad697c48adb6
Report-To: {"group": "network-errors", "max_age": 1200, "include_subdomains": true, "endpoints": [ {"url": "https://dr.yandex.net/strm", "priority": 1}, {"url": "https://dr2.yandex.net/strm", "priority": 2} ]}
NEL: {"report_to": "network-errors", "max_age": 1200, "success_fraction": 0.005, "failure_fraction": 0.05, "include_subdomains": true}
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Requestcrl.microsoft.comIN AResponsecrl.microsoft.comIN CNAMEcrl.www.ms.akadns.netcrl.www.ms.akadns.netIN CNAMEa1363.dscg.akamai.neta1363.dscg.akamai.netIN A23.209.125.31a1363.dscg.akamai.netIN A23.209.125.34
-
Remote address:23.209.125.31:80RequestGET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: 8M9bF5Tsp81z+cAg2quO8g==
Last-Modified: Thu, 26 Sep 2024 02:21:11 GMT
ETag: 0x8DCDDD1E3AF2C76
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: d4df7fec-901e-0075-17c5-0f3cc6000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Wed, 20 Nov 2024 13:11:12 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A95.100.245.144
-
Remote address:95.100.245.144:80RequestGET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: www.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: PjrtHAukbJio72s77Ag5mA==
Last-Modified: Thu, 31 Oct 2024 23:26:09 GMT
ETag: 0x8DCFA0366D6C4CA
x-ms-request-id: 7ca9c103-d01e-0016-3fee-2ba13d000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Wed, 20 Nov 2024 13:11:12 GMT
Connection: keep-alive
TLS_version: UNKNOWN
ms-cv: CASMicrosoftCV2e3fd2a7.0
ms-cv-esi: CASMicrosoftCV2e3fd2a7.0
X-RTag: RT
-
82.146.50.198:443https://xetapp.com/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yatls, http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe1.2kB 7.1kB 13 11
HTTP Request
GET https://xetapp.com/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yaHTTP Response
301 -
82.146.50.198:443https://xet.app/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8tls, http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe2.1kB 7.8kB 17 14
HTTP Request
GET https://xet.app/settings/launches.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yaHTTP Response
404HTTP Request
GET https://xet.app/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yaHTTP Response
404HTTP Request
GET https://xet.app/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8HTTP Response
404HTTP Request
GET https://xet.app/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8HTTP Response
404 -
82.146.50.198:443https://xetapp.com/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yatls, http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe1.4kB 7.7kB 13 12
HTTP Request
GET https://xetapp.com/settings/install.php?name=Secret-Disk&site=&campaign=yandex&source=ru_yaHTTP Response
301 -
172.98.192.37:80http://dl.xetapp.us/downloads/software/security/encryption/secret.disk.exehttp18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe457 B 1.2kB 6 5
HTTP Request
GET http://dl.xetapp.us/downloads/software/security/encryption/secret.disk.exeHTTP Response
200 -
82.146.50.198:443https://xetapp.com/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8tls, http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe1.2kB 7.6kB 12 11
HTTP Request
GET https://xetapp.com/settings/promo-installs.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8HTTP Response
301 -
82.146.50.198:443https://xetapp.com/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8tls, http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe1.1kB 7.0kB 10 10
HTTP Request
GET https://xetapp.com/settings/promo-installs-real.php?name=Secret-Disk&site=&campaign=yandex&ip=&date=&ya_cmd=8HTTP Response
301 -
5.45.205.242:80http://download.yandex.ru/yandex-pack/downloader/downloader.exehttp18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe446 B 1.3kB 6 4
HTTP Request
GET http://download.yandex.ru/yandex-pack/downloader/downloader.exeHTTP Response
302 -
5.45.192.12:80http://cachev2-rad-05.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=309http18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe4.0kB 215.8kB 83 157
HTTP Request
GET http://cachev2-rad-05.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=309HTTP Response
200 -
445 B 1.7kB 5 4
HTTP Request
GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crlHTTP Response
200 -
439 B 1.7kB 5 4
HTTP Request
GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crlHTTP Response
200
-
56 B 72 B 1 1
DNS Request
xetapp.com
DNS Response
82.146.50.198
-
53 B 69 B 1 1
DNS Request
xet.app
DNS Response
82.146.50.198
-
58 B 74 B 1 1
DNS Request
dl.xetapp.us
DNS Response
172.98.192.37
-
8.8.8.8:53download.yandex.rudns18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe64 B 172 B 1 1
DNS Request
download.yandex.ru
DNS Response
5.45.205.2425.45.205.2445.45.205.2455.45.205.2415.45.205.243
-
8.8.8.8:53cachev2-rad-05.cdn.yandex.netdns18674bbd9af6e4e7396363a4f7d72312a50514f72ee4c4ceb131738801100438.exe75 B 91 B 1 1
DNS Request
cachev2-rad-05.cdn.yandex.net
DNS Response
5.45.192.12
-
63 B 162 B 1 1
DNS Request
crl.microsoft.com
DNS Response
23.209.125.3123.209.125.34
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
95.100.245.144
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a