Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 04:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe
-
Size
11.5MB
-
MD5
161433181357a754f4fe059aa805a288
-
SHA1
9a21c5e0175cf721c9819a0dabe8cb1708871ab3
-
SHA256
941505a64b1fcc4e333393495c8ded041b8371066fafa86d79ec47921ef041a9
-
SHA512
c07d30c9ff5e0293e21a46c44e1e08811685f523f0c900bdac5d9c9b6d361056f95c2b250ee5af79ecca126013a559dd7e312adcb99d8396c4f67b6d646e881b
-
SSDEEP
6144:92MDRs+9skCSisUPOdxJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJb:92y6eCSioT
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1852 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\isxghqmd\ImagePath = "C:\\Windows\\SysWOW64\\isxghqmd\\nluveapl.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe -
Deletes itself 1 IoCs
pid Process 3660 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 5664 nluveapl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5664 set thread context of 3660 5664 nluveapl.exe 101 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4348 sc.exe 5244 sc.exe 5644 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2016 3784 WerFault.exe 84 2632 5664 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nluveapl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4872 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 88 PID 3784 wrote to memory of 4872 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 88 PID 3784 wrote to memory of 4872 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 88 PID 3784 wrote to memory of 968 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 90 PID 3784 wrote to memory of 968 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 90 PID 3784 wrote to memory of 968 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 90 PID 3784 wrote to memory of 4348 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 92 PID 3784 wrote to memory of 4348 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 92 PID 3784 wrote to memory of 4348 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 92 PID 3784 wrote to memory of 5244 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 94 PID 3784 wrote to memory of 5244 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 94 PID 3784 wrote to memory of 5244 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 94 PID 3784 wrote to memory of 5644 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 96 PID 3784 wrote to memory of 5644 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 96 PID 3784 wrote to memory of 5644 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 96 PID 5664 wrote to memory of 3660 5664 nluveapl.exe 101 PID 5664 wrote to memory of 3660 5664 nluveapl.exe 101 PID 5664 wrote to memory of 3660 5664 nluveapl.exe 101 PID 5664 wrote to memory of 3660 5664 nluveapl.exe 101 PID 5664 wrote to memory of 3660 5664 nluveapl.exe 101 PID 3784 wrote to memory of 1852 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 104 PID 3784 wrote to memory of 1852 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 104 PID 3784 wrote to memory of 1852 3784 2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\isxghqmd\2⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nluveapl.exe" C:\Windows\SysWOW64\isxghqmd\2⤵
- System Location Discovery: System Language Discovery
PID:968
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create isxghqmd binPath= "C:\Windows\SysWOW64\isxghqmd\nluveapl.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description isxghqmd "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5244
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start isxghqmd2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 11922⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\isxghqmd\nluveapl.exeC:\Windows\SysWOW64\isxghqmd\nluveapl.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-04-04_161433181357a754f4fe059aa805a288_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 5122⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5664 -ip 56641⤵PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3784 -ip 37841⤵PID:5460
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.ax-0001.ax-msedge.netg-bing-com.ax-0001.ax-msedge.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.28.10ax-0001.ax-msedge.netIN A150.171.27.10
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=Remote address:150.171.28.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1CC451A6338C6A6B2479446232AB6B09; domain=.bing.com; expires=Wed, 29-Apr-2026 04:56:53 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 71A786A3062143BB86B8F3E4D2FE2176 Ref B: LON04EDGE0712 Ref C: 2025-04-04T04:56:53Z
date: Fri, 04 Apr 2025 04:56:53 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=Remote address:150.171.28.10:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1CC451A6338C6A6B2479446232AB6B09
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=BKA2iDcFRryUCI7tqjH3B9SQ49TZLwh3bcioycn5Sq4; domain=.bing.com; expires=Wed, 29-Apr-2026 04:56:53 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0019D08D27DA4C68A5E3C2D80C0F5AE5 Ref B: LON04EDGE0712 Ref C: 2025-04-04T04:56:53Z
date: Fri, 04 Apr 2025 04:56:53 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=Remote address:150.171.28.10:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1CC451A6338C6A6B2479446232AB6B09; MSPTC=BKA2iDcFRryUCI7tqjH3B9SQ49TZLwh3bcioycn5Sq4
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CD362F7999E44047A25F06663FE81A98 Ref B: LON04EDGE0712 Ref C: 2025-04-04T04:56:53Z
date: Fri, 04 Apr 2025 04:56:53 GMT
-
Remote address:8.8.8.8:53Requestmicrosoft.comIN AResponsemicrosoft.comIN A13.107.246.59
-
Remote address:8.8.8.8:53Requestmicrosoft.comIN MXResponsemicrosoft.comIN MXmicrosoft-commail protectionoutlook�
-
Remote address:8.8.8.8:53Requestmicrosoft-com.mail.protection.outlook.comIN AResponsemicrosoft-com.mail.protection.outlook.comIN A52.101.8.49microsoft-com.mail.protection.outlook.comIN A52.101.40.26microsoft-com.mail.protection.outlook.comIN A52.101.42.0microsoft-com.mail.protection.outlook.comIN A52.101.11.0
-
Remote address:8.8.8.8:53Requestyahoo.comIN MXResponseyahoo.comIN MXmta5am0yahoodnsnetyahoo.comIN MXmta6�.yahoo.comIN MXmta7�.
-
Remote address:8.8.8.8:53Requestmta5.am0.yahoodns.netIN AResponsemta5.am0.yahoodns.netIN A98.136.96.75mta5.am0.yahoodns.netIN A67.195.228.111mta5.am0.yahoodns.netIN A98.136.96.74mta5.am0.yahoodns.netIN A67.195.204.72mta5.am0.yahoodns.netIN A67.195.204.73mta5.am0.yahoodns.netIN A67.195.204.74mta5.am0.yahoodns.netIN A98.136.96.76mta5.am0.yahoodns.netIN A67.195.228.106
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388156_1Z2O2J8YHL5HTDB24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239339388156_1Z2O2J8YHL5HTDB24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 641224
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C376095F9A474DC7918D262FE10ECF23 Ref B: LON04EDGE1222 Ref C: 2025-04-04T04:57:27Z
date: Fri, 04 Apr 2025 04:57:27 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239353388073_1SY37RLMEXBSAP5P1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239353388073_1SY37RLMEXBSAP5P1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 616456
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 154155301FF14FEFB8D048960241C756 Ref B: LON04EDGE1222 Ref C: 2025-04-04T04:57:27Z
date: Fri, 04 Apr 2025 04:57:27 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388119_10QYQ7X0D3WF71UDP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239339388119_10QYQ7X0D3WF71UDP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 624243
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 42C947A1F63C43FD84F849442E3A3978 Ref B: LON04EDGE1222 Ref C: 2025-04-04T04:57:27Z
date: Fri, 04 Apr 2025 04:57:27 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388155_1D0BH5IJGCW4E5I58&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239339388155_1D0BH5IJGCW4E5I58&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 697659
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0FDDD562EA8F4CAF8AC9239164B662A6 Ref B: LON04EDGE1222 Ref C: 2025-04-04T04:57:27Z
date: Fri, 04 Apr 2025 04:57:27 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239353388079_1I03GNWN380ZGL8MJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239353388079_1I03GNWN380ZGL8MJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 745212
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D414FD2023C5465AA485C9F86B8D3D0A Ref B: LON04EDGE1222 Ref C: 2025-04-04T04:57:27Z
date: Fri, 04 Apr 2025 04:57:27 GMT
-
Remote address:8.8.8.8:53Requestgoogle.comIN MXResponsegoogle.comIN MXsmtp�
-
Remote address:8.8.8.8:53Requestsmtp.google.comIN AResponsesmtp.google.comIN A74.125.71.26smtp.google.comIN A74.125.71.27smtp.google.comIN A108.177.15.27smtp.google.comIN A108.177.15.26smtp.google.comIN A173.194.76.27
-
Remote address:8.8.8.8:53Requestc.pki.googIN AResponsec.pki.googIN CNAMEpki-goog.l.google.compki-goog.l.google.comIN A142.250.187.227
-
Remote address:142.250.187.227:80RequestGET /r/r1.crl HTTP/1.1
Cache-Control: max-age = 3000
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
User-Agent: Microsoft-CryptoAPI/10.0
Host: c.pki.goog
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 993
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Fri, 04 Apr 2025 04:51:24 GMT
Expires: Fri, 04 Apr 2025 05:41:24 GMT
Cache-Control: public, max-age=3000
Last-Modified: Thu, 03 Apr 2025 14:18:00 GMT
Content-Type: application/pkix-crl
Vary: Accept-Encoding
Age: 390
-
Remote address:8.8.8.8:53Requestmail.ruIN MXResponsemail.ruIN MXmxs�
-
Remote address:8.8.8.8:53Requestmxs.mail.ruIN AResponsemxs.mail.ruIN A94.100.180.31mxs.mail.ruIN A217.69.139.150
-
150.171.28.10:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=tls, http22.0kB 9.3kB 21 17
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=c4e7ec94212d4c5da48a550cfd0be91f&localId=w:ACC80AAA-1844-E958-013E-C7D282AA1E44&deviceId=6825849398674208&anid=HTTP Response
204 -
190 B 92 B 4 2
-
260 B 5
-
260 B 5
-
260 B 5
-
1.6kB 7.0kB 21 14
-
1.6kB 7.0kB 21 14
-
1.6kB 7.0kB 21 13
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239353388079_1I03GNWN380ZGL8MJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2118.0kB 3.5MB 2526 2517
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388156_1Z2O2J8YHL5HTDB24&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239353388073_1SY37RLMEXBSAP5P1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388119_10QYQ7X0D3WF71UDP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388155_1D0BH5IJGCW4E5I58&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239353388079_1I03GNWN380ZGL8MJ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.6kB 7.0kB 21 14
-
260 B 5
-
260 B 5
-
476 B 1.9kB 6 5
HTTP Request
GET http://c.pki.goog/r/r1.crlHTTP Response
200 -
260 B 5
-
260 B 5
-
56 B 148 B 1 1
DNS Request
g.bing.com
DNS Response
150.171.28.10150.171.27.10
-
59 B 75 B 1 1
DNS Request
microsoft.com
DNS Response
13.107.246.59
-
59 B 113 B 1 1
DNS Request
microsoft.com
-
87 B 151 B 1 1
DNS Request
microsoft-com.mail.protection.outlook.com
DNS Response
52.101.8.4952.101.40.2652.101.42.052.101.11.0
-
55 B 134 B 1 1
DNS Request
yahoo.com
-
67 B 195 B 1 1
DNS Request
mta5.am0.yahoodns.net
DNS Response
98.136.96.7567.195.228.11198.136.96.7467.195.204.7267.195.204.7367.195.204.7498.136.96.7667.195.228.106
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
-
56 B 77 B 1 1
DNS Request
google.com
-
61 B 141 B 1 1
DNS Request
smtp.google.com
DNS Response
74.125.71.2674.125.71.27108.177.15.27108.177.15.26173.194.76.27
-
56 B 107 B 1 1
DNS Request
c.pki.goog
DNS Response
142.250.187.227
-
53 B 73 B 1 1
DNS Request
mail.ru
-
57 B 89 B 1 1
DNS Request
mxs.mail.ru
DNS Response
94.100.180.31217.69.139.150
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.9MB
MD53bd0fec5fa9a4edb63631bbc44c5cdf0
SHA126b61e3b447b530207edc7a685707f4919d0c5c4
SHA2564de0ad29002605c855712b2447a95eb381043ee39a2ba87b99aab79b21274626
SHA512fee3a0350693ca04f44a4ee52f6a86832dddda002eaa1bd076b3a86e7ad2342568b0fb14b8d97566470b3183d1bda1167ca14eb50f87d043894f14ea72ba5638