Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4811fc8d84cfbc83f03751e0bc5d3130_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4811fc8d84cfbc83f03751e0bc5d3130_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4811fc8d84cfbc83f03751e0bc5d3130_JaffaCakes118.html
-
Size
72KB
-
MD5
4811fc8d84cfbc83f03751e0bc5d3130
-
SHA1
7886340de329cbd28e86d1ae69fffa99f4356e8b
-
SHA256
d288a2376fcd00f75be7e248c5defbd6d76b0ac6ec5d2e6f670557b852fb1818
-
SHA512
1012e771bf1c235e79a58fb62368d7b240440e76664b1d3be654d4e74f3de0d0b30a54758d95d0ab96278d8bccdf7673e63e159a91dd74aa616e946941ddd838
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sgf6uIUsUoUU+3QoTyS1wCZkoTyMdtbBnfBgN8/lboii:J36TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 2648 msedge.exe 2648 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 212 2648 msedge.exe 83 PID 2648 wrote to memory of 212 2648 msedge.exe 83 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 2536 2648 msedge.exe 84 PID 2648 wrote to memory of 5116 2648 msedge.exe 85 PID 2648 wrote to memory of 5116 2648 msedge.exe 85 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86 PID 2648 wrote to memory of 3160 2648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4811fc8d84cfbc83f03751e0bc5d3130_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3039467056706888440,11490572093110387480,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2548 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request240.197.17.2.in-addr.arpaIN PTRResponse240.197.17.2.in-addr.arpaIN PTRa2-17-197-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestimg.sedoparking.comIN AResponseimg.sedoparking.comIN CNAMEsedo.cachefly.netsedo.cachefly.netIN CNAMEvip1.g5.cachefly.netvip1.g5.cachefly.netIN A205.234.175.175
-
Remote address:205.234.175.175:80RequestGET /js/jquery-1.11.3.custom.min.js HTTP/1.1
Host: img.sedoparking.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Length: 25176
Connection: keep-alive
Access-Control-Allow-Origin: *
Cache-Control: max-age=86400
Expires: Thu, 16 May 2024 21:14:57 GMT
X-CFHash: "7dd2fc9525d32ef5c44abe9036c98ad1"
X-CFF: B
Last-Modified: Thu, 28 Jun 2018 13:09:28 GMT
Vary: Accept-Encoding
X-CF3: H
CF4Age: 0
x-cf-tsc: 1685886798
CF4ttl: 31536000.000
Content-Encoding: gzip
X-CF2: H
Server: CFS 0215
X-CF-ReqID: 35e2e2d5a954525df840beb153736fbe
X-CF1: 11696:fG.lon1:cf:nom:cacheN.lon1-01:H
Accept-Ranges: bytes
-
Remote address:205.234.175.175:80RequestGET /templates/brick_gfx/common/logo_2016_blue.svg HTTP/1.1
Host: img.sedoparking.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Type: image/svg+xml
Content-Length: 2077
Connection: keep-alive
Access-Control-Allow-Origin: *
Cache-Control: max-age=604800
Expires: Wed, 22 May 2024 21:14:57 GMT
X-CFHash: "cc975fdfd0cacdb8d27a0797b2d6ba71"
X-CFF: B
Last-Modified: Thu, 28 Jun 2018 13:09:28 GMT
Vary: Accept-Encoding
X-CF3: H
CF4Age: 0
x-cf-tsc: 1714078443
CF4ttl: 31536000.000
Content-Encoding: gzip
X-CF2: H
Server: CFS 0215
X-CF-ReqID: a461b5832288d6792fb8e160f5f9c0c0
X-CF1: 11696:fG.lon1:cf:nom:cacheN.lon1-01:H
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Requestww1.srv.desk-top-app.infoIN AResponse
-
Remote address:8.8.8.8:53Requestsedoparking.comIN AResponsesedoparking.comIN A64.190.63.136
-
GEThttp://sedoparking.com/search/rl.php?rlt=1522046625f0f6ad6da932407928cb73b13f147821&num=10&callback=jQuery111303001563053278644_1715807697129&_=1715807697130msedge.exeRemote address:64.190.63.136:80RequestGET /search/rl.php?rlt=1522046625f0f6ad6da932407928cb73b13f147821&num=10&callback=jQuery111303001563053278644_1715807697129&_=1715807697130 HTTP/1.1
Host: sedoparking.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 403 Forbidden
content-type: text/html; charset=UTF-8
transfer-encoding: chunked
vary: Accept-Encoding
x-powered-by: PHP/8.1.17
expires: Mon, 26 Jul 1997 05:00:00 GMT
cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma: no-cache
last-modified: Wed, 15 May 2024 21:14:58 GMT
x-cache-miss-from: parking-7cbf88ff6b-bsk5t
server: NginX
content-encoding: gzip
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request175.175.234.205.in-addr.arpaIN PTRResponse175.175.234.205.in-addr.arpaIN PTRvip1 G-anycast1cacheflynet
-
Remote address:8.8.8.8:53Request136.63.190.64.in-addr.arpaIN PTRResponse
-
GEThttps://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90Remote address:2.17.196.96:443RequestGET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1107
date: Wed, 15 May 2024 21:15:01 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.5cc41102.1715807701.51360688
-
Remote address:8.8.8.8:53Request96.196.17.2.in-addr.arpaIN PTRResponse96.196.17.2.in-addr.arpaIN PTRa2-17-196-96deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request31.121.18.2.in-addr.arpaIN PTRResponse31.121.18.2.in-addr.arpaIN PTRa2-18-121-31deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request249.197.17.2.in-addr.arpaIN PTRResponse249.197.17.2.in-addr.arpaIN PTRa2-17-197-249deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 394521
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F4CB8D6B634846C0B98F4D3FA2FE98F5 Ref B: LON04EDGE1011 Ref C: 2024-05-15T21:16:38Z
date: Wed, 15 May 2024 21:16:37 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 442324
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CABE3918CB454548BD86EAF687804DC3 Ref B: LON04EDGE1011 Ref C: 2024-05-15T21:16:38Z
date: Wed, 15 May 2024 21:16:37 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 430689
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 37BF661B25C04700B9FEA8EC98B3ED0C Ref B: LON04EDGE1011 Ref C: 2024-05-15T21:16:38Z
date: Wed, 15 May 2024 21:16:38 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 415458
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1AE93FEE0B554507A149119E3FB59458 Ref B: LON04EDGE1011 Ref C: 2024-05-15T21:16:38Z
date: Wed, 15 May 2024 21:16:38 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
205.234.175.175:80http://img.sedoparking.com/templates/brick_gfx/common/logo_2016_blue.svghttpmsedge.exe1.6kB 29.6kB 19 29
HTTP Request
GET http://img.sedoparking.com/js/jquery-1.11.3.custom.min.jsHTTP Response
200HTTP Request
GET http://img.sedoparking.com/templates/brick_gfx/common/logo_2016_blue.svgHTTP Response
200 -
64.190.63.136:80http://sedoparking.com/search/rl.php?rlt=1522046625f0f6ad6da932407928cb73b13f147821&num=10&callback=jQuery111303001563053278644_1715807697129&_=1715807697130httpmsedge.exe706 B 713 B 6 4
HTTP Request
GET http://sedoparking.com/search/rl.php?rlt=1522046625f0f6ad6da932407928cb73b13f147821&num=10&callback=jQuery111303001563053278644_1715807697129&_=1715807697130HTTP Response
403 -
2.17.196.96:443https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90tls, http21.4kB 6.3kB 16 11
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90HTTP Response
200 -
1.1kB 589 B 10 8
-
1.4kB 8.1kB 17 14
-
1.3kB 9.5kB 17 15
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http262.1kB 1.7MB 1273 1269
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360313429_1X5GXWWD8KTODKAD6&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360313430_12K7UVO7ZVIINTRIE&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
240.197.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
65 B 134 B 1 1
DNS Request
img.sedoparking.com
DNS Response
205.234.175.175
-
71 B 150 B 1 1
DNS Request
ww1.srv.desk-top-app.info
-
61 B 77 B 1 1
DNS Request
sedoparking.com
DNS Response
64.190.63.136
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
74 B 116 B 1 1
DNS Request
175.175.234.205.in-addr.arpa
-
72 B 156 B 1 1
DNS Request
136.63.190.64.in-addr.arpa
-
397 B 6
-
70 B 133 B 1 1
DNS Request
96.196.17.2.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
31.121.18.2.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
249.197.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5142344df78cd0f4ec523029b300743f2
SHA1783041eb2995c6d7ad78f62dd879f8fb80065aaa
SHA2565a74522283cac010bd49817224d4a5eda88d52f58a2de890211c8580b69bcbb7
SHA5129c5d7e3e9f7e24f11679c01e3c56add5262beab9ef7a14147ef2a942db92b5d2f2cf10ffccd9c755bdbdf37e80a37b2c7ab0415ad8dd2ba67a0bd5550db25054
-
Filesize
6KB
MD53f73c49ede395a4f57fc83f254a535a4
SHA13a2238355b46764bb0462e5142d7318e2e577d84
SHA256389a87f6996fb14fb8b8777a7c98e55d540b11c82c5d76059dec82c38c0e2d38
SHA512f3432df9e3fd19e5cbbb851c152508e0db33996e41aff28ef3f7aeb1567b407f7f2978e249eec4d01f2c4b9051078ec0b2dc9c596e809b4d3f0437cbed5e65d8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5518b79191ecfef69dcefe27e9ed0563e
SHA18aeafbee7212b01c6365cb7029bfc7bd86b9da51
SHA256e3330b5c66014546504aacb66533a1d6f22126e24714507fc8153f6b4f48c572
SHA5127ff3cd2b6d666ebc7f51ba3c103caf9faf1aee9f3dc4c849bda1ab923ad2a82a29d1763485470639b809b8c60f3f4ba18f1b945608f12b4e9c5f47d9ee374bbf