Analysis
-
max time kernel
299s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 18:32 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D
Resource
win10v2004-20230703-en
General
-
Target
http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336603889804896" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2532 1848 chrome.exe 43 PID 1848 wrote to memory of 2532 1848 chrome.exe 43 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 4324 1848 chrome.exe 87 PID 1848 wrote to memory of 1660 1848 chrome.exe 88 PID 1848 wrote to memory of 1660 1848 chrome.exe 88 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89 PID 1848 wrote to memory of 2540 1848 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb3109758,0x7ffeb3109768,0x7ffeb31097782⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:22⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2840 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:82⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3960 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 --field-trial-handle=1900,i,6323800363928449748,11914446839306943576,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2856
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request126.23.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestemail.sf-notifications.comIN AResponseemail.sf-notifications.comIN CNAMEsendgrid.netsendgrid.netIN A167.89.115.56sendgrid.netIN A167.89.123.54sendgrid.netIN A167.89.115.120sendgrid.netIN A167.89.123.124
-
GEThttp://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3Dchrome.exeRemote address:167.89.115.56:80RequestGET /wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D HTTP/1.1
Host: email.sf-notifications.com
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Date: Wed, 12 Jul 2023 18:33:07 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Sat, 15 Jul 2000 05:00:00 GMT
X-Robots-Tag: noindex, nofollow
-
Remote address:167.89.115.56:80RequestGET /favicon.ico HTTP/1.1
Host: email.sf-notifications.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer: http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 404 Not Found
Date: Wed, 12 Jul 2023 18:33:09 GMT
Content-Type: text/html
Content-Length: 564
Connection: keep-alive
-
GEThttp://email.sf-notifications.com/gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3Dchrome.exeRemote address:167.89.115.56:80RequestGET /gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3D HTTP/1.1
Host: email.sf-notifications.com
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 404 Not Found
Date: Wed, 12 Jul 2023 18:33:14 GMT
Content-Type: text/html
Content-Length: 564
Connection: keep-alive
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.115.89.167.in-addr.arpaIN PTRResponse56.115.89.167.in-addr.arpaIN PTRo16789115x56 outbound-mailsendgridnet
-
Remote address:8.8.8.8:53Request42.36.251.142.in-addr.arpaIN PTRResponse42.36.251.142.in-addr.arpaIN PTRams17s12-in-f101e100net
-
Remote address:8.8.8.8:53Requestclients2.google.comIN AResponseclients2.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.251.36.46
-
Remote address:8.8.8.8:53Request46.36.251.142.in-addr.arpaIN PTRResponse46.36.251.142.in-addr.arpaIN PTRams17s12-in-f141e100net
-
Remote address:8.8.8.8:53Request195.233.44.23.in-addr.arpaIN PTRResponse195.233.44.23.in-addr.arpaIN PTRa23-44-233-195deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestassets.msn.comIN AResponseassets.msn.comIN CNAMEassets.msn.com.edgekey.netassets.msn.com.edgekey.netIN CNAMEe28578.d.akamaiedge.nete28578.d.akamaiedge.netIN A2.16.241.76e28578.d.akamaiedge.netIN A2.16.241.97
-
GEThttps://assets.msn.com/serviceak/v1/news/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&activityId=0a1847d3-047d-42de-8e73-e07dcc4e0261&ocid=windows-windowsShell-feeds&user=m-70c31f41647e46938fbaa0e2f28afd05&Treatment=T6&MaximumDimensions=660x640&experience=Taskbar&AppVersion=1&osLocale=en-US&caller=bgtaskRemote address:2.16.241.76:443RequestGET /serviceak/v1/news/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&activityId=0a1847d3-047d-42de-8e73-e07dcc4e0261&ocid=windows-windowsShell-feeds&user=m-70c31f41647e46938fbaa0e2f28afd05&Treatment=T6&MaximumDimensions=660x640&experience=Taskbar&AppVersion=1&osLocale=en-US&caller=bgtask HTTP/2.0
host: assets.msn.com
x-search-account: None
accept-encoding: gzip, deflate
x-device-machineid: {4F901D09-C7B3-4142-BC6B-116CA1F2D68B}
x-userageclass: Unknown
x-bm-market: US
x-bm-dateformat: M/d/yyyy
x-device-ossku: 48
x-bm-dtz: 0
x-deviceid: 0100B2E609000CC3
x-bm-windowsflights: FX:119E26AD,FX:11D898D7,FX:11DB147C,FX:11DE505A,FX:11E11E97,FX:11E3E2BA,FX:11E50151,FX:11E9EE98,FX:11F1992A,FX:11F4161E,FX:11F41B68,FX:11FB0F2F,FX:1201B330,FX:1202B7FC,FX:120BB68E,FX:121A20E1,FX:121BF15F,FX:121E5EC8,FX:122D8E86,FX:123031A3,FX:1231B88B,FX:123371B1,FX:1233C945,FX:123D7C31,FX:1240013C,FX:1246E4A3,FX:1248306D,FX:124B38D0,FX:1250080B,FX:125A7FDA,FX:1264FA75,FX:126DBC22,FX:127159BE,FX:12769734,FX:127C935B,FX:127DC03A,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5
sitename: www.msn.com
x-bm-theme: 000000;0078d7
muid: 70C31F41647E46938FBAA0E2F28AFD05
x-agent-deviceid: 0100B2E609000CC3
x-bm-onlinesearchdisabled: true
x-bm-cbt: 1689186794
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.2.19041; 10.0.0.0.19041.1288) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
x-device-isoptin: false
accept-language: en-US, en
x-device-touch: false
x-device-clientsession: 119CBFFE96B04150922E6C480E762C1D
cookie: MUID=70C31F41647E46938FBAA0E2F28AFD05
ResponseHTTP/2.0 200
server: Kestrel
access-control-allow-credentials: true
access-control-allow-headers: TicketType,RequestContinuationKey,AuthToken,Content-Type,x-client-activityid,ms-cv,signedInCookieName,muid,appid,User-Location,user-location,userauthtoken,usertickettype,sitename,s2sauthtoken,thumbprint,Authorization,Ent-Authorization,UserIdToken,DDD-TMPL,DDD-ActivityId,DDD-FeatureSet,DDD-Session-ID,Date,date,ads-referer,ads-referer,taboola-sessionId,taboola-sessionid,Akamai-Request-ID,Akamai-Server-IP,X-MSEdge-Ref,DDD-DebugId,s-xbox-token,OneWebServiceLatency,X-FD-Features,DDD-UserType,traceparent
access-control-allow-methods: PUT,PATCH,POST,GET,OPTIONS,DELETE
access-control-allow-origin: *.msn.com
access-control-expose-headers: TicketType,RequestContinuationKey,AuthToken,Content-Type,x-client-activityid,ms-cv,signedInCookieName,muid,appid,User-Location,user-location,userauthtoken,usertickettype,sitename,s2sauthtoken,thumbprint,Authorization,Ent-Authorization,UserIdToken,DDD-TMPL,DDD-ActivityId,DDD-FeatureSet,DDD-Session-ID,Date,date,ads-referer,ads-referer,taboola-sessionId,taboola-sessionid,Akamai-Request-ID,Akamai-Server-IP,X-MSEdge-Ref,DDD-DebugId,s-xbox-token,OneWebServiceLatency,X-FD-Features,DDD-UserType,traceparent
content-encoding: gzip
ddd-authenticatedwithjwtflow: False
ddd-usertype: AnonymousMuid
ddd-tmpl: lowC:0;lowT:0;partialResponse:1;daucoldcap:1;tbn:0;winbadge:1;coldStart:1;coldStartUpsell:1
x-wpo-activityid: 1A7C943A-93F7-4C4B-B420-9083888D2207|2023-07-12T18:33:17.1413161Z|fabric:/wpo|WEU|WPO_47
ddd-feednewsitemcount: 0
ddd-activityid: 1a7c943a-93f7-4c4b-b420-9083888d2207
ddd-strategyexecutionlatency: 00:00:00.1818763
ddd-debugid: 1a7c943a-93f7-4c4b-b420-9083888d2207|2023-07-12T18:33:17.1493193Z|fabric:/winfeed|WEU|WinFeed_212
onewebservicelatency: 182
x-msedge-responseinfo: 182
x-ceto-ref: 64aef1ec30754c97a060615a50803372|2023-07-12T18:33:16.971Z
expires: Wed, 12 Jul 2023 18:33:17 GMT
date: Wed, 12 Jul 2023 18:33:17 GMT
content-length: 1488
akamai-request-bc: [a=2.16.240.12,b=125353953,c=g,n=DE_HE_FRANKFURT,o=20940],[a=20.23.114.34,c=o]
server-timing: clientrtt; dur=40, clienttt; dur=193, origin; dur=192 , cdntime; dur=1
akamai-cache-status: Miss from child
akamai-server-ip: 2.16.240.12
akamai-request-id: 778bfe1
x-as-suppresssetcookie: 1
cache-control: private, max-age=0
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://deff.nelreports.net/api/report?cat=msn"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":0.1}
timing-allow-origin: *
vary: Origin
-
Remote address:8.8.8.8:53Request76.241.16.2.in-addr.arpaIN PTRResponse76.241.16.2.in-addr.arpaIN PTRa2-16-241-76deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request45.19.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request54.120.234.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.234.253.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request12.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.121.18.2.in-addr.arpaIN PTRResponse83.121.18.2.in-addr.arpaIN PTRa2-18-121-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request38.148.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.177.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.177.238.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request141.121.18.2.in-addr.arpaIN PTRResponse141.121.18.2.in-addr.arpaIN PTRa2-18-121-141deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.33.24.67.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.33.24.67.in-addr.arpaIN PTRResponse
-
167.89.115.56:80http://email.sf-notifications.com/gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3Dhttpchrome.exe2.7kB 2.1kB 11 8
HTTP Request
GET http://email.sf-notifications.com/wf/open?upn=JPVjueZLqtmnCd89-2B-2Fa-2FdtE3YQOKdaalGEO37Dreuxl-2B58RCDlWRhCxr2yHJ8iAa2t7fhNiOQP3gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3DHTTP Response
200HTTP Request
GET http://email.sf-notifications.com/favicon.icoHTTP Response
404HTTP Request
GET http://email.sf-notifications.com/gfPu8SDFOz4jB-2FKfzg9c8CmHwm7aE6isokFQk-2Fd9NboGg57f45sbaw5DCzUyYYvPDNEeM7O2AJ4rf9qAbt0VHNcOgnpy6qXzfx4nnok2jPFdEJfCnih1rfqN44Kg6Tk0cSBuKezFUDqjrtqFB-2B6Zg-2Fx2858-2FHU0tZKT-2FZijZAIhiHB7rqO1mzuW5EKb17acSHXlw419M-2FkHTszIHjLynV-2F-2BfqHc-2FiXzk-3DHTTP Response
404 -
236 B 184 B 5 4
-
1.1kB 8.4kB 12 12
-
886 B 4.8kB 8 8
-
886 B 4.8kB 8 7
-
2.16.241.76:443https://assets.msn.com/serviceak/v1/news/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&activityId=0a1847d3-047d-42de-8e73-e07dcc4e0261&ocid=windows-windowsShell-feeds&user=m-70c31f41647e46938fbaa0e2f28afd05&Treatment=T6&MaximumDimensions=660x640&experience=Taskbar&AppVersion=1&osLocale=en-US&caller=bgtasktls, http22.7kB 10.5kB 21 19
HTTP Request
GET https://assets.msn.com/serviceak/v1/news/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&activityId=0a1847d3-047d-42de-8e73-e07dcc4e0261&ocid=windows-windowsShell-feeds&user=m-70c31f41647e46938fbaa0e2f28afd05&Treatment=T6&MaximumDimensions=660x640&experience=Taskbar&AppVersion=1&osLocale=en-US&caller=bgtaskHTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
126.23.238.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 162 B 1 1
DNS Request
email.sf-notifications.com
DNS Response
167.89.115.56167.89.123.54167.89.115.120167.89.123.124
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 125 B 1 1
DNS Request
56.115.89.167.in-addr.arpa
-
72 B 111 B 1 1
DNS Request
42.36.251.142.in-addr.arpa
-
65 B 105 B 1 1
DNS Request
clients2.google.com
DNS Response
142.251.36.46
-
3.9kB 8.1kB 13 13
-
204 B 3
-
72 B 111 B 1 1
DNS Request
46.36.251.142.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
195.233.44.23.in-addr.arpa
-
60 B 166 B 1 1
DNS Request
assets.msn.com
DNS Response
2.16.241.762.16.241.97
-
70 B 133 B 1 1
DNS Request
76.241.16.2.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
45.19.74.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
54.120.234.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
254.234.253.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
12.173.189.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.121.18.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
38.148.119.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
144 B 252 B 2 2
DNS Request
254.177.238.8.in-addr.arpa
DNS Request
254.177.238.8.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
141.121.18.2.in-addr.arpa
-
144 B 316 B 2 2
DNS Request
11.227.111.52.in-addr.arpa
DNS Request
11.227.111.52.in-addr.arpa
-
142 B 250 B 2 2
DNS Request
254.33.24.67.in-addr.arpa
DNS Request
254.33.24.67.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ccaef06d00379ab0016a49fc3dd619f
SHA1aa12983f7b9ae2e23e2a6eb6c52f820be54bd243
SHA2567b9d5adc6d35f089ec83ae75919104995e9258cc758fd46220be638895db3a15
SHA5125948029bedeb1c9408c146792a2dd27a154e9226f8117f0097197e7e4ea2e5b6a081627dfc203903e9faaf20e9fbaf70a6f193d7789e55c985c0ec98c179db60
-
Filesize
6KB
MD51f97651c4aced6dbb6169cf59d8b6c21
SHA103053c311ae677edb4824d9ffe957fc61618f147
SHA256d4e4a7d03e45eec2439b79a823b9e19956dde6785961b4068618ebb488ddd4c4
SHA512c3fa571b759cc66bd575274e690ab87ecea2fdf9c10507fa34ba38a3d1b1b39b7a8c408f201f670cdebe82e481a9a52c006318ace08a0cf620e307541936f5dc
-
Filesize
15KB
MD5228d78ca2019a53bfa3180afd9ed9607
SHA1046d9bdf525615ebe3add6918264a524c8dca425
SHA2567bc35ccc6b4265346d0d478a07e20a3de7e6d8fd31eb7a13c1d96834f9ddaf32
SHA512c8681796384e9018b742d5d4b3ebd20c4cffc51b9431b00a1ab4c5c69a040718aaecc7c9695e20a152a8e6a3966f58546349417d6774fbfb9a261ef0152f81d4
-
Filesize
173KB
MD5156c6b014033f11cbe42a636cfb1756d
SHA11d8d4b278640b7eeda586baf18af9e5c56846e24
SHA25642601b79bcf9c0c7c9cb1d471a5c881b87daa56cb8f309200fe26e38ddf020a6
SHA512046cc67056023545bf050ca5ad9ed90c9d68221fffbf648f3b7449b28cc6259ceb8ae277479df5b0b1b9773064a13b685e978f58a5f243c3422aecba429ed5c7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd