Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/10/2023, 09:59 UTC
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://teams.microsoft.com/meetingOptions/?organizerId=0ee=3bf2-d573-4850-95fa-c4b0bbf75cec&tenantId=fe51472c-6660-4ae5-995a-ac=f14ef2b07&threadId=19_meeting_MmE2ZDYxZWUtZmZmYy00NDAyLWE5YjUtNGE2ZG=kYmRkNzkz@thread.v2&messageId=0&language=es-MX
Resource
win10v2004-20230915-es
General
-
Target
https://teams.microsoft.com/meetingOptions/?organizerId=0ee=3bf2-d573-4850-95fa-c4b0bbf75cec&tenantId=fe51472c-6660-4ae5-995a-ac=f14ef2b07&threadId=19_meeting_MmE2ZDYxZWUtZmZmYy00NDAyLWE5YjUtNGE2ZG=kYmRkNzkz@thread.v2&messageId=0&language=es-MX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408007926080728" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2164 chrome.exe 2164 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe Token: SeShutdownPrivilege 2020 chrome.exe Token: SeCreatePagefilePrivilege 2020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe 2020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4644 2020 chrome.exe 52 PID 2020 wrote to memory of 4644 2020 chrome.exe 52 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3044 2020 chrome.exe 86 PID 2020 wrote to memory of 3744 2020 chrome.exe 85 PID 2020 wrote to memory of 3744 2020 chrome.exe 85 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89 PID 2020 wrote to memory of 3988 2020 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://teams.microsoft.com/meetingOptions/?organizerId=0ee=3bf2-d573-4850-95fa-c4b0bbf75cec&tenantId=fe51472c-6660-4ae5-995a-ac=f14ef2b07&threadId=19_meeting_MmE2ZDYxZWUtZmZmYy00NDAyLWE5YjUtNGE2ZG=kYmRkNzkz@thread.v2&messageId=0&language=es-MX1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdea9d9758,0x7ffdea9d9768,0x7ffdea9d97782⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:22⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3688 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:12⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3628 --field-trial-handle=1856,i,3981900768771371394,18192997412733156371,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1648
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestteams.microsoft.comIN AResponseteams.microsoft.comIN CNAMEteams.office.comteams.office.comIN CNAMEtmc-g2.tm-4.office.comtmc-g2.tm-4.office.comIN CNAMEteams-office-com.s-0005.dual-s-msedge.netteams-office-com.s-0005.dual-s-msedge.netIN CNAMEs-0005.dual-s-msedge.nets-0005.dual-s-msedge.netIN A52.123.128.14s-0005.dual-s-msedge.netIN A52.123.129.14
-
Remote address:8.8.8.8:53Requeststatics.teams.cdn.office.netIN AResponsestatics.teams.cdn.office.netIN CNAMEteams-staticscdn.trafficmanager.netteams-staticscdn.trafficmanager.netIN CNAMEstatics-teams-cdn-office-net.s-0005.dual-s-msedge.netstatics-teams-cdn-office-net.s-0005.dual-s-msedge.netIN CNAMEs-0005.dual-s-msedge.nets-0005.dual-s-msedge.netIN A52.123.128.14s-0005.dual-s-msedge.netIN A52.123.129.14
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request14.128.123.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request138.179.250.142.in-addr.arpaIN PTRResponse138.179.250.142.in-addr.arpaIN PTRams17s10-in-f101e100net
-
Remote address:8.8.8.8:53Request132.194.113.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestlogin.microsoftonline.comIN AResponselogin.microsoftonline.comIN CNAMElogin.mso.msidentity.comlogin.mso.msidentity.comIN CNAMEak.privatelink.msidentity.comak.privatelink.msidentity.comIN CNAMEwww.tm.ak.prd.aadg.trafficmanager.netwww.tm.ak.prd.aadg.trafficmanager.netIN A20.190.159.73www.tm.ak.prd.aadg.trafficmanager.netIN A20.190.159.2www.tm.ak.prd.aadg.trafficmanager.netIN A20.190.159.71www.tm.ak.prd.aadg.trafficmanager.netIN A40.126.31.67www.tm.ak.prd.aadg.trafficmanager.netIN A40.126.31.73www.tm.ak.prd.aadg.trafficmanager.netIN A40.126.31.71www.tm.ak.prd.aadg.trafficmanager.netIN A20.190.159.64www.tm.ak.prd.aadg.trafficmanager.netIN A20.190.159.68
-
Remote address:8.8.8.8:53Requestaadcdn.msauth.netIN AResponseaadcdn.msauth.netIN CNAMEaadcdnoriginwus2.azureedge.netaadcdnoriginwus2.azureedge.netIN CNAMEaadcdnoriginwus2.afd.azureedge.netaadcdnoriginwus2.afd.azureedge.netIN CNAMEfirstparty-azurefd-prod.trafficmanager.netfirstparty-azurefd-prod.trafficmanager.netIN CNAMEdual.part-0039.t-0009.t-msedge.netdual.part-0039.t-0009.t-msedge.netIN CNAMEpart-0039.t-0009.t-msedge.netpart-0039.t-0009.t-msedge.netIN A13.107.246.67part-0039.t-0009.t-msedge.netIN A13.107.213.67
-
Remote address:8.8.8.8:53Requestidentity.nel.measure.office.netIN AResponseidentity.nel.measure.office.netIN CNAMEnel.measure.office.net.edgesuite.netnel.measure.office.net.edgesuite.netIN CNAMEa1894.dscb.akamai.neta1894.dscb.akamai.netIN A92.122.101.10a1894.dscb.akamai.netIN A92.122.101.27
-
Remote address:92.122.101.10:443RequestOPTIONS /api/report?catId=GW+estsfd+dub2 HTTP/2.0
host: identity.nel.measure.office.net
origin: https://login.microsoftonline.com
access-control-request-method: POST
access-control-request-headers: content-type
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-length: 7
date: Tue, 03 Oct 2023 09:59:50 GMT
access-control-allow-headers: content-type
access-control-allow-credentials: false
access-control-allow-methods: *
access-control-allow-methods: GET, OPTIONS, POST
access-control-allow-origin: *
-
Remote address:92.122.101.10:443RequestPOST /api/report?catId=GW+estsfd+dub2 HTTP/2.0
host: identity.nel.measure.office.net
content-length: 776
content-type: application/reports+json
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 429
request-context: appId=cid-v1:0df9f0fa-2b61-4bcc-8864-10ea6079c765
date: Tue, 03 Oct 2023 09:59:50 GMT
access-control-allow-credentials: false
access-control-allow-methods: *
access-control-allow-methods: GET, OPTIONS, POST
access-control-allow-origin: *
-
Remote address:92.122.101.10:443RequestOPTIONS /api/report?catId=GW+estsfd+dub2 HTTP/2.0
host: identity.nel.measure.office.net
origin: https://login.microsoftonline.com
access-control-request-method: POST
access-control-request-headers: content-type
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-length: 7
date: Tue, 03 Oct 2023 10:00:50 GMT
access-control-allow-headers: content-type
access-control-allow-credentials: false
access-control-allow-methods: *
access-control-allow-methods: GET, OPTIONS, POST
access-control-allow-origin: *
-
Remote address:92.122.101.10:443RequestPOST /api/report?catId=GW+estsfd+dub2 HTTP/2.0
host: identity.nel.measure.office.net
content-length: 780
content-type: application/reports+json
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 429
request-context: appId=cid-v1:0df9f0fa-2b61-4bcc-8864-10ea6079c765
date: Tue, 03 Oct 2023 10:00:50 GMT
access-control-allow-credentials: false
access-control-allow-methods: *
access-control-allow-methods: GET, OPTIONS, POST
access-control-allow-origin: *
-
Remote address:8.8.8.8:53Requestaadcdn.msftauth.netIN AResponseaadcdn.msftauth.netIN CNAMEcs1100.wpc.omegacdn.netcs1100.wpc.omegacdn.netIN A152.199.23.37
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request67.246.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.101.122.92.in-addr.arpaIN PTRResponse10.101.122.92.in-addr.arpaIN PTRa92-122-101-10deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A104.85.5.163
-
Remote address:8.8.8.8:53Requestprivacy.microsoft.comIN AResponseprivacy.microsoft.comIN CNAMEprivacy.microsoft.com.edgekey.netprivacy.microsoft.com.edgekey.netIN CNAMEe13678.dspb.akamaiedge.nete13678.dspb.akamaiedge.netIN A104.85.5.163
-
Remote address:8.8.8.8:53Requestcontent-autofill.googleapis.comIN AResponsecontent-autofill.googleapis.comIN A142.250.179.138content-autofill.googleapis.comIN A142.251.36.42content-autofill.googleapis.comIN A142.250.179.170content-autofill.googleapis.comIN A142.250.179.202content-autofill.googleapis.comIN A142.251.36.10content-autofill.googleapis.comIN A142.251.39.106content-autofill.googleapis.comIN A172.217.23.202content-autofill.googleapis.comIN A216.58.214.10
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesteu-mobile.events.data.microsoft.comIN AResponseeu-mobile.events.data.microsoft.comIN CNAMEeu.events.data.trafficmanager.neteu.events.data.trafficmanager.netIN CNAMEonedscolprdneu01.northeurope.cloudapp.azure.comonedscolprdneu01.northeurope.cloudapp.azure.comIN A20.50.73.9
-
Remote address:8.8.8.8:53Request9.73.50.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.173.189.20.in-addr.arpaIN PTRResponse
-
4.1kB 89.1kB 48 84
-
33.9kB 1.9MB 696 1366
-
1.1kB 6.9kB 10 12
-
1.1kB 6.9kB 10 12
-
1.1kB 6.9kB 10 12
-
1.1kB 6.9kB 10 12
-
1.1kB 6.9kB 9 12
-
1.2kB 6.9kB 9 13
-
13.5kB 479.7kB 223 401
-
3.5kB 15.9kB 15 18
-
4.7kB 21.9kB 20 25
-
5.8kB 215.6kB 92 166
-
92.122.101.10:443https://identity.nel.measure.office.net/api/report?catId=GW+estsfd+dub2tls, http2chrome.exe4.2kB 6.9kB 26 34
HTTP Request
OPTIONS https://identity.nel.measure.office.net/api/report?catId=GW+estsfd+dub2HTTP Response
200HTTP Request
POST https://identity.nel.measure.office.net/api/report?catId=GW+estsfd+dub2HTTP Response
429HTTP Request
OPTIONS https://identity.nel.measure.office.net/api/report?catId=GW+estsfd+dub2HTTP Response
200HTTP Request
POST https://identity.nel.measure.office.net/api/report?catId=GW+estsfd+dub2HTTP Response
429 -
5.7kB 163.4kB 82 144
-
1.8kB 7.4kB 12 12
-
5.6kB 8.0kB 16 16
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
65 B 219 B 1 1
DNS Request
teams.microsoft.com
DNS Response
52.123.128.1452.123.129.14
-
74 B 230 B 1 1
DNS Request
statics.teams.cdn.office.net
DNS Response
52.123.128.1452.123.129.14
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.128.123.52.in-addr.arpa
-
74 B 113 B 1 1
DNS Request
138.179.250.142.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
132.194.113.52.in-addr.arpa
-
71 B 314 B 1 1
DNS Request
login.microsoftonline.com
DNS Response
20.190.159.7320.190.159.220.190.159.7140.126.31.6740.126.31.7340.126.31.7120.190.159.6420.190.159.68
-
63 B 283 B 1 1
DNS Request
aadcdn.msauth.net
DNS Response
13.107.246.6713.107.213.67
-
77 B 188 B 1 1
DNS Request
identity.nel.measure.office.net
DNS Response
92.122.101.1092.122.101.27
-
65 B 115 B 1 1
DNS Request
aadcdn.msftauth.net
DNS Response
152.199.23.37
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
67.246.107.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
10.101.122.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
104.85.5.163
-
67 B 167 B 1 1
DNS Request
privacy.microsoft.com
DNS Response
104.85.5.163
-
77 B 205 B 1 1
DNS Request
content-autofill.googleapis.com
DNS Response
142.250.179.138142.251.36.42142.250.179.170142.250.179.202142.251.36.10142.251.39.106172.217.23.202216.58.214.10
-
204 B 3
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
81 B 202 B 1 1
DNS Request
eu-mobile.events.data.microsoft.com
DNS Response
20.50.73.9
-
69 B 155 B 1 1
DNS Request
9.73.50.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
18.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864B
MD56ee019fb054c4f85c63c8677d572d2c6
SHA1c0c8249009349fb6fc48a447a17d323b5f161b37
SHA2561bedb87a5e26b1448b767445e5e0c323ec785d6bff88bededa4c96d8cfa25590
SHA5120e15fdfbf20864f6a3148f0b3ce57bdd403e3609640a7fd2254584f5a43ece61691141596cf9172d76f246efd4f26e75140832748ddfd07da0f7de15d8b0b567
-
Filesize
2KB
MD517939cba648816427c5d57fd4aa60ad2
SHA1c68c9a7e647ff5eff5068fcadbe1c04a419b0a61
SHA256ca0c1dcd2fffffc5fa5f18590abb836b48cfb74a2f70dbba00e39fec6bb3308e
SHA51203c38f0f4479a60af3d00c399f811c70057e5450e54140632c5070376bc962df47e2155512962cf5935dc6a86566cd747d10c38ab49a21db26b483834d84cf62
-
Filesize
2KB
MD5a3922b9e71240e406aed9d8af26abe7d
SHA17482dbe666678f9ddfda5c9f8279bbb89f254e25
SHA256334ba407e507b8df2e5922a15b847ce7ccd97e2f2afdeaaf4108ed9646e55b6c
SHA5120ab8217344a7985140c553b0e5261ec66b562b82397f81722d4b7d76af915f9f32412fe8723258b943c0f1b59b042dd0bc3678d87d21314d09d4f20e39df68c8
-
Filesize
1KB
MD57f0cfec9f7dad786bf6e8762e3627adf
SHA1f14ff61b1552c17fe4be951ece612185bb4bf20c
SHA25635dd192fd6d10fd382c8d0798b86d085b442ca448f82d310a15fdfeebc312721
SHA51297145cc0b49720c0b8fb08e8cb6a63822e0b88d3c56361aa116ecb7b70b6e52d4280eeafc0e5649ce3474ec60d1943ba4f6b38619a9dcdaea3f66a063ecda62f
-
Filesize
1KB
MD5ade519c39b0c49324114964910834529
SHA1557e4a54bfca054d9b5bce78a1a1dbf091649695
SHA256d55f7c03569b12ef3b654375e3e26f10a5d96e0415bbb9888c6372f38c4cc2d0
SHA5121b9aaaf1b0f02216b8dd50ff1e1261eb9b7e3f144a0adf3f0371568f095b29ba280f55d0ad55b0bcba4f5579b201f115e75f359626df1cf54984d80e311819bd
-
Filesize
6KB
MD54f9bf2c59aa5f8a879aa127923e25ee6
SHA100ae4dce9d3a284cdbd80a81b3ef3a004c57ede3
SHA256764db642d9b2eea2be33336499fbb299cf84837b5daf9255d731f895af51e9e2
SHA512b38d8f68eb90d73c85f5de013c2330c1e26453245e8c44539e587aaf32ca9f0e214496a5aa90e8e273913e0ae1913693ecdab56381f47772be7f34a2b47bf046
-
Filesize
101KB
MD5049166571e15f27971763397b67afbd2
SHA1798222a6d0001176d24450fec987d7f93fef87ee
SHA256c19459477a3566f056686f52b21719cef01940af9922a7793483e3f446b91b91
SHA512b875a01ecc5ca41d5c9c96d4dc3145ed46eca51b6bbea9677ed41b2e57427f774bae77bdcee91e185d2a31a0f952570462213b78c1e5edf69994199155c40c2f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd