Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
70s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/01/2025, 15:41 UTC
Static task
static1
General
-
Target
07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe
-
Size
1.7MB
-
MD5
8919a3ebfb67cc3d12f475baa82ca476
-
SHA1
0e6aa733c49dc293f2936b32600390cedb0767ae
-
SHA256
07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9
-
SHA512
eac4ba93e8f84413a4d5a4e590263c493011cdfa2a6b96dee2222930a22c30ef885d4651d0783b10c26b8b75cc1f61c32302671dcf9de9f1a3dd19a29c1d1593
-
SSDEEP
24576:rcbD/3+3Nb8c6xUN8c/CNlSC3Af8XwYJs4nUAo3E5IuquLJlxpCp8zMgNFLtU5Vp:rcbz+3H6NXL3cYi4nUpmIm2BIG5VBj
Malware Config
Extracted
44caliber
https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKjPH9PGr5fHvc41o-BfoHkgQRjS
Signatures
-
44Caliber family
-
Executes dropped EXE 1 IoCs
pid Process 3312 CromulentLauncher.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3312 CromulentLauncher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CromulentLauncher.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 CromulentLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier CromulentLauncher.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 0c0001008421de39050000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 1e00718000000000000000000000e1a40ed25739d211a40b0c50205241530000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "287309825" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Key created \Registry\User\S-1-5-21-556537508-2730415644-482548075-1000_Classes\NotificationData explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1204 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2852 WINWORD.EXE 2852 WINWORD.EXE 4452 explorer.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3312 CromulentLauncher.exe 3312 CromulentLauncher.exe 3312 CromulentLauncher.exe 3312 CromulentLauncher.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3312 CromulentLauncher.exe Token: SeShutdownPrivilege 4988 control.exe Token: SeCreatePagefilePrivilege 4988 control.exe Token: SeDebugPrivilege 1236 taskmgr.exe Token: SeSystemProfilePrivilege 1236 taskmgr.exe Token: SeCreateGlobalPrivilege 1236 taskmgr.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4452 explorer.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe 1236 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3312 CromulentLauncher.exe 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3388 wrote to memory of 3312 3388 07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe 77 PID 3388 wrote to memory of 3312 3388 07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe 77 PID 3388 wrote to memory of 3312 3388 07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe 77 PID 4452 wrote to memory of 1236 4452 explorer.exe 91 PID 4452 wrote to memory of 1236 4452 explorer.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe"C:\Users\Admin\AppData\Local\Temp\07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\CromulentLauncher.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\InstallUpdate.cmd1⤵
- Opens file in notepad (likely ransom note)
PID:1204
-
C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2852
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4820
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236
-
Network
-
Remote address:8.8.8.8:53Requestfreegeoip.appIN AResponsefreegeoip.appIN A104.21.96.1freegeoip.appIN A104.21.80.1freegeoip.appIN A104.21.112.1freegeoip.appIN A104.21.16.1freegeoip.appIN A104.21.48.1freegeoip.appIN A104.21.32.1freegeoip.appIN A104.21.64.1
-
Remote address:8.8.8.8:53Requestipbase.comIN AResponseipbase.comIN A104.21.85.189ipbase.comIN A172.67.209.71
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A2.16.153.11a767.dspw65.akamai.netIN A2.16.153.13
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestconfig.edge.skype.comIN AResponseconfig.edge.skype.comIN CNAMEconfig.edge.skype.com.trafficmanager.netconfig.edge.skype.com.trafficmanager.netIN CNAMEl-0007.config.skype.coml-0007.config.skype.comIN CNAMEconfig-edge-skype.l-0007.l-msedge.netconfig-edge-skype.l-0007.l-msedge.netIN CNAMEl-0007.l-msedge.netl-0007.l-msedge.netIN A13.107.42.16
-
Remote address:8.8.8.8:53Request19.89.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdcus19.centralus.cloudapp.azure.comonedscolprdcus19.centralus.cloudapp.azure.comIN A52.182.143.214
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEcac-ocsp.digicert.com.edgekey.netcac-ocsp.digicert.com.edgekey.netIN CNAMEe3913.cd.akamaiedge.nete3913.cd.akamaiedge.netIN A104.78.173.167
-
Remote address:8.8.8.8:53Request65.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request184.143.101.95.in-addr.arpaIN PTRResponse184.143.101.95.in-addr.arpaIN PTRa95-101-143-184deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request1.96.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEcac-ocsp.digicert.com.edgekey.netcac-ocsp.digicert.com.edgekey.netIN CNAMEe3913.cd.akamaiedge.nete3913.cd.akamaiedge.netIN A104.78.173.167
-
Remote address:8.8.8.8:53Requestofficeclient.microsoft.comIN AResponseofficeclient.microsoft.comIN CNAMEconfig.officeapps.live.comconfig.officeapps.live.comIN CNAMEprod.configsvc1.live.com.akadns.netprod.configsvc1.live.com.akadns.netIN CNAMEeurope.configsvc1.live.com.akadns.neteurope.configsvc1.live.com.akadns.netIN CNAMEuks-azsc-config.officeapps.live.comuks-azsc-config.officeapps.live.comIN A52.109.28.46
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEcac-ocsp.digicert.com.edgekey.netcac-ocsp.digicert.com.edgekey.netIN CNAMEe3913.cd.akamaiedge.nete3913.cd.akamaiedge.netIN A104.78.173.167
-
Remote address:8.8.8.8:53Requestfp.msedge.netIN AResponsefp.msedge.netIN CNAME1.perf.msedge.net1.perf.msedge.netIN CNAMEa-0019.a-msedge.neta-0019.a-msedge.netIN CNAMEa-0019.a.dns.azurefd.neta-0019.a.dns.azurefd.netIN CNAMEa-0019.standard.a-msedge.neta-0019.standard.a-msedge.netIN A204.79.197.222
-
Remote address:8.8.8.8:53Requestfp.msedge.netIN A
-
Remote address:8.8.8.8:53Request189.85.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.153.16.2.in-addr.arpaIN PTRResponse11.153.16.2.in-addr.arpaIN PTRa2-16-153-11deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEweu-azsc-000.roaming.officeapps.live.comweu-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.comosiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.comIN A52.109.89.19
-
Remote address:8.8.8.8:53Request46.28.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestlogin.live.comIN AResponselogin.live.comIN CNAMElogin.msa.msidentity.comlogin.msa.msidentity.comIN CNAMEwww.tm.lg.prod.aadmsa.trafficmanager.netwww.tm.lg.prod.aadmsa.trafficmanager.netIN CNAMEprdv4a.aadg.msidentity.comprdv4a.aadg.msidentity.comIN CNAMEwww.tm.v4.a.prd.aadg.trafficmanager.netwww.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.160.65www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.160.131www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.160.128www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.32.136www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.32.74www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.160.4www.tm.v4.a.prd.aadg.trafficmanager.netIN A20.190.160.14www.tm.v4.a.prd.aadg.trafficmanager.netIN A40.126.32.138
-
Remote address:8.8.8.8:53Requestwww.bing.comIN AResponsewww.bing.comIN CNAMEwww-www.bing.com.trafficmanager.netwww-www.bing.com.trafficmanager.netIN CNAMEwww.bing.com.edgekey.netwww.bing.com.edgekey.netIN CNAMEe86303.dscx.akamaiedge.nete86303.dscx.akamaiedge.netIN A95.101.143.184e86303.dscx.akamaiedge.netIN A95.101.143.200e86303.dscx.akamaiedge.netIN A95.101.143.195e86303.dscx.akamaiedge.netIN A95.101.143.185e86303.dscx.akamaiedge.netIN A95.101.143.201e86303.dscx.akamaiedge.netIN A95.101.143.193e86303.dscx.akamaiedge.netIN A95.101.143.179e86303.dscx.akamaiedge.netIN A95.101.143.202e86303.dscx.akamaiedge.netIN A95.101.143.203
-
Remote address:8.8.8.8:53Request214.143.182.52.in-addr.arpaIN PTRResponse
-
Remote address:52.109.89.19:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_159
X-OfficeVersion: 16.0.18527.30575
X-OfficeCluster: weu-000.roaming.officeapps.live.com
Content-Security-Policy-Report-Only: script-src 'nonce-mmdcAZKxHGBbfgHWOfz/Zb9V4gGUJo/2VFwa0yniXHfr8QkHJlbbs9zACPGe/Vhn1b45pvQl3TXbXWlRl53FvDAazi3tApGHwTyXXQoUL8G5lg9r0GiJg9qmI2dE0Ze348JhNQVi/liOQImScOcISjzT8GI+sCstbrnUtOImCgM=' 'unsafe-inline' 'unsafe-eval' 'strict-dynamic' https:; base-uri 'self'; object-src 'none'; require-trusted-types-for 'script'; report-uri https://csp.microsoft.com/report/OfficeIce-OfficeRoaming-Prod; frame-ancestors 'none';
X-Frame-Options: Deny
X-CorrelationId: 599e4898-470c-43aa-9f59-c31f35c68f8a
X-Powered-By: ASP.NET
Date: Fri, 31 Jan 2025 15:42:19 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request222.197.79.204.in-addr.arpaIN PTRResponse
-
753 B 4.6kB 7 7
-
885 B 8.3kB 10 13
-
101.9kB 2.1MB 1591 1531
-
52.109.89.19:443https://roaming.officeapps.live.com/rs/RoamingSoapService.svctls, httpWINWORD.EXE1.8kB 8.3kB 12 11
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200 -
21.1kB 593.8kB 438 435
-
745 B 1.8kB 11 11
DNS Request
freegeoip.app
DNS Response
104.21.96.1104.21.80.1104.21.112.1104.21.16.1104.21.48.1104.21.32.1104.21.64.1
DNS Request
ipbase.com
DNS Response
104.21.85.189172.67.209.71
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
2.16.153.112.16.153.13
DNS Request
167.173.78.104.in-addr.arpa
DNS Request
config.edge.skype.com
DNS Response
13.107.42.16
DNS Request
19.89.109.52.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
52.182.143.214
DNS Request
ocsp.digicert.com
DNS Response
104.78.173.167
DNS Request
65.160.190.20.in-addr.arpa
DNS Request
184.143.101.95.in-addr.arpa
-
386 B 916 B 6 5
DNS Request
1.96.21.104.in-addr.arpa
DNS Request
ocsp.digicert.com
DNS Response
104.78.173.167
DNS Request
officeclient.microsoft.com
DNS Response
52.109.28.46
DNS Request
ocsp.digicert.com
DNS Response
104.78.173.167
DNS Request
fp.msedge.net
DNS Request
fp.msedge.net
DNS Response
204.79.197.222
-
477 B 1.5kB 7 7
DNS Request
189.85.21.104.in-addr.arpa
DNS Request
11.153.16.2.in-addr.arpa
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.89.19
DNS Request
46.28.109.52.in-addr.arpa
DNS Request
login.live.com
DNS Response
20.190.160.6520.190.160.13120.190.160.12840.126.32.13640.126.32.7420.190.160.420.190.160.1440.126.32.138
DNS Request
www.bing.com
DNS Response
95.101.143.18495.101.143.20095.101.143.19595.101.143.18595.101.143.20195.101.143.19395.101.143.17995.101.143.20295.101.143.203
DNS Request
214.143.182.52.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
222.197.79.204.in-addr.arpa
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
1KB
MD58afe145407231d996cb2efed00250273
SHA1cdf1fef5a3adc11073a8e7ddf47438c914daea32
SHA25649a392dbcd86684338f6cf81ca6ec18b31ab608354fe9949d1bd53d6c38d29b7
SHA5126d176e90ef500994b7766345d07c27bf392b1e0fb7145bfb8ac28e8e6e0c91419f9ab64d18960729416a91a5e38ffde07fd37864b7c195db16d639b6f53789c2
-
Filesize
765B
MD5eb8043846caf31483f3c9d2874bfe29d
SHA1b903e9e075899be8dd1c10bc127f903a475fd33e
SHA256b4e7f30d1c3dd31a8b97a61eaf63d8a84a25ed168f44d0980a6238ab1039a98c
SHA512ee303faba59b55d9314eea30c764abebb9b9209f6dabe5f2d2d1d7226f3379c1fa04874d871079a2c2b0486eafd8f62da4af4137ecce120e655b88e67ca47327
-
Filesize
28KB
MD509d642aefcb8618fa681adbbc0bf75a6
SHA185814a5700b4d78364fdb781c56f0ec23844b1a2
SHA256bb379f027935fae8f0e4c1768683e20675a0526f98ac4684dafca4c9501d81c5
SHA5122154eb7b0c316d9542176dd98849ff83d91c16d1fa9685268f33849ff88b0ad350834a7890a094c2a33eceb68fa49b2a82111a02ce53f715a29b7ee0caa65833
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\81bcf342-e591-4493-9dcf-307a7d14a45a.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
Filesize
1.2MB
MD523d86a9388b2473d0b8c8d8c75de793c
SHA1d7938fb0ddaeed76d6ead3ad9ed030934603247e
SHA2569633ed8a684b052247e4850948b3e8b33c428066eb1c32179c547f477c5dfaf7
SHA5127115b93efbb44ab74b157d683a61bb4e8dbf6faac46516916cb95ef310b1ccb587ff638113ffbb76530a936ee5358562132475de74710ff64e27d5add68d842d