Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 01:01 UTC

General

  • Target

    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe

  • Size

    4.4MB

  • MD5

    7537cbf0be7a66963956dbd48f0e6ea3

  • SHA1

    2ab191b1cda3496fa883736bd91239104fb64c84

  • SHA256

    772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8

  • SHA512

    6761ab4422c372ef10a3b83c61ec498d8d32d7e392de1efff25400b91301f0f4d63cda7fed264183e1ab1ee6b5fa528404644f793adcf273687a39421e7d7bc8

  • SSDEEP

    98304:j8wBQvHNu/JwUNX4j5DzE1BQTSiQRG04TfzBhcrZy:QUQvtueUccpi0A/Mr8

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 20 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • GoLang User-Agent 5 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:3596
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe /188-188
        3⤵
        • Executes dropped EXE
        • Manipulates WinMonFS driver.
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3744
        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3512

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    humisnee.com
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    Remote address:
    8.8.8.8:53
    Request
    humisnee.com
    IN A
    Response
    humisnee.com
    IN A
    37.48.65.151
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    survey-smiles.com
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    Remote address:
    8.8.8.8:53
    Request
    survey-smiles.com
    IN A
    Response
    survey-smiles.com
    IN A
    199.59.243.227
  • flag-us
    GET
    http://survey-smiles.com/
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: survey-smiles.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:01:56 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: fd2e24d1-661b-4cc7-b6da-a549846116d1
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_GSbXHjSyM4GBXh+TDdQi5Ch6arC3xeKj8KkRwOq4qrqrlRcvBA0AmkBJ57Iam4tUGtRHYm5e3uPQsAB9Z6SRbg==
    set-cookie: parking_session=fd2e24d1-661b-4cc7-b6da-a549846116d1; expires=Sun, 22 Dec 2024 01:16:57 GMT; path=/
  • flag-us
    DNS
    151.65.48.37.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    151.65.48.37.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    227.243.59.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    227.243.59.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    2makestorage.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    2makestorage.com
    IN TXT
    Response
  • flag-us
    DNS
    nisdably.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    nisdably.com
    IN TXT
    Response
    nisdably.com
    IN TXT
    .v=spf1 include:_incspfcheck.mailspike.net ?all
  • flag-us
    DNS
    009f1672-e8e3-4e7a-9fd0-638f2ee4dcde.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    009f1672-e8e3-4e7a-9fd0-638f2ee4dcde.ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    server6.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    server6.ninhaine.com
    IN A
    Response
    server6.ninhaine.com
    IN A
    46.8.9.145
  • flag-us
    DNS
    ww53.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww53.ninhaine.com
    IN A
    Response
    ww53.ninhaine.com
    IN CNAME
    g87442272.c.giantpanda.com
    g87442272.c.giantpanda.com
    IN A
    139.162.181.76
    g87442272.c.giantpanda.com
    IN A
    172.104.149.86
  • flag-us
    DNS
    ww82.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww82.ninhaine.com
    IN A
    Response
    ww82.ninhaine.com
    IN CNAME
    63214.bodis.com
    63214.bodis.com
    IN A
    199.59.243.227
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/json; charset=UTF-8
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Sun, 22 Dec 2024 01:02:00 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=13d022b6567e30848ee00bcbd8f89f00; Path=/; HttpOnly; Max-Age=86400; Expires=Sunday, 22-Dec-2024 01:02:00 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Sun, 22 Dec 2024 01:02:00 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=c86f941cdf7ce6299fdc4edd2bdee328; Path=/; HttpOnly; Max-Age=86400; Expires=Sunday, 22-Dec-2024 01:02:00 GMT
    Content-Encoding: gzip
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:01:59 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 4984fe2c-3f7c-4d8b-9316-14dea61077da
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=4984fe2c-3f7c-4d8b-9316-14dea61077da; expires=Sun, 22 Dec 2024 01:17:00 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.130 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:02:04 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: b6edf194-3f91-46fc-9df9-6e0e23a3c797
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_UUy0tDt494sMM3NKoFVOC4DTivOED7ScVdkzRjEk1nuhpQkTK0c+hnUpeLSgfaMr4AYZ2miVwPc7OT8Wu+wLDA==
    set-cookie: parking_session=b6edf194-3f91-46fc-9df9-6e0e23a3c797; expires=Sun, 22 Dec 2024 01:17:05 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:74.0) Gecko/20100101 Firefox/74.0
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:02:08 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 02ae81d8-8ccf-47b2-b3ea-2045aac314c6
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_HOJwisvqfkQYe3YxaKdJH95tEIErvYLi5HcL1anzoHEoc7tc2oPqC9pByXBYFLhe//VYH/f6JdZkNpKrQPnZQQ==
    set-cookie: parking_session=02ae81d8-8ccf-47b2-b3ea-2045aac314c6; expires=Sun, 22 Dec 2024 01:17:09 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:02:08 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 62832da5-102f-46d0-822d-6ea5b2f069ff
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=62832da5-102f-46d0-822d-6ea5b2f069ff; expires=Sun, 22 Dec 2024 01:17:09 GMT; path=/
  • flag-us
    DNS
    145.9.8.46.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    145.9.8.46.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    76.181.162.139.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.181.162.139.in-addr.arpa
    IN PTR
    Response
    76.181.162.139.in-addr.arpa
    IN PTR
    139-162-181-76iplinodeusercontentcom
  • flag-us
    DNS
    spolaect.info
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    spolaect.info
    IN A
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Sun, 22 Dec 2024 01:02:05 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=ade6df8e3d94b33cbf5f1cce245c4d40; Path=/; HttpOnly; Max-Age=86400; Expires=Sunday, 22-Dec-2024 01:02:05 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Safari/605.1.15
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Sun, 22 Dec 2024 01:02:06 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=7dd29fb665dede643373e41d7028b1ca; Path=/; HttpOnly; Max-Age=86400; Expires=Sunday, 22-Dec-2024 01:02:06 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.116 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Sun, 22 Dec 2024 01:02:07 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=2ac8d8d3fdd5b1f5696c5d5b322fc59d; Path=/; HttpOnly; Max-Age=86400; Expires=Sunday, 22-Dec-2024 01:02:07 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.42.69.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.42.69.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    180.129.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    180.129.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.122 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Sun, 22 Dec 2024 01:03:20 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 3cbc3172-bb65-4c73-96c4-65c8c084e1bb
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_rMdlG4llKTVStELUNxzB/mmJKkI6ZNoCSC0wBMfjFwiJFX+ro9hXjIQENE6s0AhnqTMupVKBZ7wH6GwQ8mMBbg==
    set-cookie: parking_session=3cbc3172-bb65-4c73-96c4-65c8c084e1bb; expires=Sun, 22 Dec 2024 01:18:20 GMT; path=/
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 37.48.65.151:443
    humisnee.com
    tls
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    1.4kB
    3.9kB
    12
    11
  • 199.59.243.227:80
    http://survey-smiles.com/
    http
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    429 B
    2.3kB
    6
    5

    HTTP Request

    GET http://survey-smiles.com/

    HTTP Response

    200
  • 46.8.9.145:443
    server6.ninhaine.com
    tls
    csrss.exe
    876 B
    3.6kB
    11
    9
  • 46.8.9.145:443
    server6.ninhaine.com
    tls
    csrss.exe
    16.5kB
    5.8kB
    53
    48
  • 46.8.9.145:443
    server6.ninhaine.com
    tls
    csrss.exe
    784 B
    3.5kB
    9
    8
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    421 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    423 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    1.4kB
    9.0kB
    16
    16

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    995 B
    4.2kB
    10
    8

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 46.8.9.145:443
    server6.ninhaine.com
    tls
    csrss.exe
    2.1kB
    4.0kB
    16
    16
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    529 B
    2.4kB
    7
    7

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    21.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    21.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    133.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    133.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    humisnee.com
    dns
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    58 B
    74 B
    1
    1

    DNS Request

    humisnee.com

    DNS Response

    37.48.65.151

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    survey-smiles.com
    dns
    JaffaCakes118_772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8.exe
    63 B
    79 B
    1
    1

    DNS Request

    survey-smiles.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    151.65.48.37.in-addr.arpa
    dns
    71 B
    134 B
    1
    1

    DNS Request

    151.65.48.37.in-addr.arpa

  • 8.8.8.8:53
    227.243.59.199.in-addr.arpa
    dns
    73 B
    131 B
    1
    1

    DNS Request

    227.243.59.199.in-addr.arpa

  • 8.8.8.8:53
    ninhaine.com
    dns
    csrss.exe
    58 B
    58 B
    1
    1

    DNS Request

    ninhaine.com

  • 8.8.8.8:53
    2makestorage.com
    dns
    csrss.exe
    62 B
    135 B
    1
    1

    DNS Request

    2makestorage.com

  • 8.8.8.8:53
    nisdably.com
    dns
    csrss.exe
    58 B
    117 B
    1
    1

    DNS Request

    nisdably.com

  • 8.8.8.8:53
    009f1672-e8e3-4e7a-9fd0-638f2ee4dcde.ninhaine.com
    dns
    csrss.exe
    95 B
    95 B
    1
    1

    DNS Request

    009f1672-e8e3-4e7a-9fd0-638f2ee4dcde.ninhaine.com

  • 8.8.8.8:53
    server6.ninhaine.com
    dns
    csrss.exe
    66 B
    82 B
    1
    1

    DNS Request

    server6.ninhaine.com

    DNS Response

    46.8.9.145

  • 8.8.8.8:53
    ww53.ninhaine.com
    dns
    csrss.exe
    63 B
    132 B
    1
    1

    DNS Request

    ww53.ninhaine.com

    DNS Response

    139.162.181.76
    172.104.149.86

  • 8.8.8.8:53
    ww82.ninhaine.com
    dns
    csrss.exe
    63 B
    105 B
    1
    1

    DNS Request

    ww82.ninhaine.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    145.9.8.46.in-addr.arpa
    dns
    69 B
    129 B
    1
    1

    DNS Request

    145.9.8.46.in-addr.arpa

  • 8.8.8.8:53
    76.181.162.139.in-addr.arpa
    dns
    73 B
    126 B
    1
    1

    DNS Request

    76.181.162.139.in-addr.arpa

  • 8.8.8.8:53
    spolaect.info
    dns
    csrss.exe
    59 B
    138 B
    1
    1

    DNS Request

    spolaect.info

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    241.42.69.40.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    241.42.69.40.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    180.129.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    180.129.81.91.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

    Filesize

    281KB

    MD5

    d98e33b66343e7c96158444127a117f6

    SHA1

    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

    SHA256

    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

    SHA512

    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

  • C:\Windows\rss\csrss.exe

    Filesize

    4.4MB

    MD5

    7537cbf0be7a66963956dbd48f0e6ea3

    SHA1

    2ab191b1cda3496fa883736bd91239104fb64c84

    SHA256

    772fac4009672bc62c73f2aff2032eb8db9208c9e0d4dec6db112009c799b9b8

    SHA512

    6761ab4422c372ef10a3b83c61ec498d8d32d7e392de1efff25400b91301f0f4d63cda7fed264183e1ab1ee6b5fa528404644f793adcf273687a39421e7d7bc8

  • memory/1552-11-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/3900-2-0x00000000052A0000-0x0000000005BBE000-memory.dmp

    Filesize

    9.1MB

  • memory/3900-3-0x0000000000400000-0x0000000000D39000-memory.dmp

    Filesize

    9.2MB

  • memory/3900-6-0x00000000052A0000-0x0000000005BBE000-memory.dmp

    Filesize

    9.1MB

  • memory/3900-5-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/3900-7-0x0000000000400000-0x0000000000D39000-memory.dmp

    Filesize

    9.2MB

  • memory/3900-1-0x0000000004E50000-0x0000000005297000-memory.dmp

    Filesize

    4.3MB

  • memory/5064-20-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-26-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-21-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-22-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-23-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-24-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-25-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-14-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-27-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-28-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-29-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-30-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-31-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

  • memory/5064-32-0x0000000000400000-0x0000000002F73000-memory.dmp

    Filesize

    43.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.