Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 03:59 UTC

General

  • Target

    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe

  • Size

    162KB

  • MD5

    3be90154d43c1e35591834c10ffb1076

  • SHA1

    f61a6a7aa3087f23a11fc717328c2dce2d458db0

  • SHA256

    cdf56f4c00aca27164a8d054d9da38fe8ce2594f2fcac2e18de3eea1e68f148e

  • SHA512

    b60473135c7c54233ab2d8613cf9eb1c0ef845af5fdba2ced34fe621d84d5c1468197b74c49d0b777fc89ce04621090631be05f1ae3b5ac0d9d183972e3d1a13

  • SSDEEP

    3072:IaxAMR633jqNX9B89TX5RFX5/ioEhk9GyoztEWSWNbBy3r9XlZ3aNpjO+u:ZRo3OfC7FJ6HKGVzOWSWNbBQM/M

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.claroideias.com.br/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1a4d46f8,0x7ffa1a4d4708,0x7ffa1a4d4718
        3⤵
          PID:2792
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
          3⤵
            PID:344
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3904
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
            3⤵
              PID:1460
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              3⤵
                PID:2780
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                3⤵
                  PID:2632
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:1
                  3⤵
                    PID:3200
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                    3⤵
                      PID:3416
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                      3⤵
                        PID:3516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2712
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                        3⤵
                          PID:4416
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                          3⤵
                            PID:2556
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                            3⤵
                              PID:3464
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                              3⤵
                                PID:2736
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1860 /prefetch:1
                                3⤵
                                  PID:1792
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1
                                  3⤵
                                    PID:3192
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16540942420500438085,10465439482030224329,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5552 /prefetch:2
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2364
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1664
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2228

                                  Network

                                  • flag-us
                                    DNS
                                    www.mestre105.hpg.com.br
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    www.mestre105.hpg.com.br
                                    IN A
                                    Response
                                    www.mestre105.hpg.com.br
                                    IN A
                                    172.67.129.49
                                    www.mestre105.hpg.com.br
                                    IN A
                                    104.21.1.114
                                  • flag-us
                                    GET
                                    http://www.mestre105.hpg.com.br/nvidiamanager.gif
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    172.67.129.49:80
                                    Request
                                    GET /nvidiamanager.gif HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: www.mestre105.hpg.com.br
                                    Connection: Keep-Alive
                                    Response
                                    HTTP/1.1 301 Moved Permanently
                                    Date: Fri, 12 Jul 2024 03:59:23 GMT
                                    Content-Type: text/html
                                    Content-Length: 167
                                    Connection: keep-alive
                                    Cache-Control: max-age=3600
                                    Expires: Fri, 12 Jul 2024 04:59:23 GMT
                                    Location: https://hpg.com.br/
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gyFxUFy0QOduB26tOTtgqxHxOJFQ9K5Mqjj3fgeEw%2BN4pOxZdXWJrlHQwfy6i3CgxeV8CIOF0a6x%2BjGbk6OtZbpT%2BR8fJM%2FeFlpSnd3Sap9yLdb%2B4i%2FA58geD%2ByQGtxQ020ieUSpglFLwcQ%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Vary: Accept-Encoding
                                    Server: cloudflare
                                    CF-RAY: 8a1e1ecc9cd963b7-LHR
                                  • flag-us
                                    GET
                                    http://www.mestre105.hpg.com.br/1.gif
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    172.67.129.49:80
                                    Request
                                    GET /1.gif HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: www.mestre105.hpg.com.br
                                    Connection: Keep-Alive
                                    Response
                                    HTTP/1.1 301 Moved Permanently
                                    Date: Fri, 12 Jul 2024 03:59:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 167
                                    Connection: keep-alive
                                    Cache-Control: max-age=3600
                                    Expires: Fri, 12 Jul 2024 04:59:24 GMT
                                    Location: https://hpg.com.br/
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=602yZDgZqUlnVZHxy4SQl5SJMDm%2BBGJK0f96X4CE%2BHf326jUhPT35CHSYhc%2F1eRDAcJT7vIF2MM9b2gM40DusPfbyaOtS6Tp5b3bdqHGLHPbtTPkhH94vG5WCRuva9cDwh9TtMaK9CV15fs%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Vary: Accept-Encoding
                                    Server: cloudflare
                                    CF-RAY: 8a1e1ed3786e63b7-LHR
                                  • flag-us
                                    GET
                                    http://www.mestre105.hpg.com.br/4.gif
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    172.67.129.49:80
                                    Request
                                    GET /4.gif HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: www.mestre105.hpg.com.br
                                    Connection: Keep-Alive
                                    Response
                                    HTTP/1.1 301 Moved Permanently
                                    Date: Fri, 12 Jul 2024 03:59:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 167
                                    Connection: keep-alive
                                    Cache-Control: max-age=3600
                                    Expires: Fri, 12 Jul 2024 04:59:24 GMT
                                    Location: https://hpg.com.br/
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sPuYuH7tDKR8IKnGzDKMkJps2JMmGVlHHFk2XX1hdgaPTH8vY6AOXehkiJU0DJeyMF9OBDFi0Jowz47Gf7ha6ssTkZzyiNnRnn3IjUaQ6acKW6tz8NLpVCZfdBn9T2tMVsJy4ngOp3DFeZc%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Vary: Accept-Encoding
                                    Server: cloudflare
                                    CF-RAY: 8a1e1ed408c363b7-LHR
                                  • flag-us
                                    GET
                                    http://www.mestre105.hpg.com.br/2.gif
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    172.67.129.49:80
                                    Request
                                    GET /2.gif HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Host: www.mestre105.hpg.com.br
                                    Connection: Keep-Alive
                                    Response
                                    HTTP/1.1 301 Moved Permanently
                                    Date: Fri, 12 Jul 2024 03:59:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 167
                                    Connection: keep-alive
                                    Cache-Control: max-age=3600
                                    Expires: Fri, 12 Jul 2024 04:59:24 GMT
                                    Location: https://hpg.com.br/
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xnCMxy%2BZRR3uCGzTX4COHFsNO%2FZTdzD%2BC7fGMGViqxaaZoEF5gQq7RhnDmnUbrcpSsH3lEi8jFplHSFLT%2Fog6y01pYDAvaYQWTpw8IMsEJZEp%2BrQb37SGCZ1UoHiCra6wTtWnhwHPhvwYRo%3D"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Vary: Accept-Encoding
                                    Server: cloudflare
                                    CF-RAY: 8a1e1ed4890163b7-LHR
                                  • flag-us
                                    DNS
                                    hpg.com.br
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    hpg.com.br
                                    IN A
                                    Response
                                    hpg.com.br
                                    IN A
                                    104.21.1.114
                                    hpg.com.br
                                    IN A
                                    172.67.129.49
                                  • flag-us
                                    GET
                                    https://hpg.com.br/
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    Remote address:
                                    104.21.1.114:443
                                    Request
                                    GET / HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                    Connection: Keep-Alive
                                    Host: hpg.com.br
                                    Response
                                    HTTP/1.1 200 OK
                                    Date: Fri, 12 Jul 2024 03:59:24 GMT
                                    Content-Type: text/html; charset=UTF-8
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    vary: Accept-Encoding
                                    link: <https://hpg.com.br/wp-json/>; rel="https://api.w.org/"
                                    Cache-Control: s-maxage=31536000, max-age=60
                                    x-wp-cf-super-cache: cache
                                    x-wp-cf-super-cache-active: 1
                                    x-wp-cf-super-cache-cache-control: s-maxage=31536000, max-age=60
                                    x-wp-cf-super-cache-cookies-bypass: swfpc-feature-not-enabled
                                    x-powered-by: PortoFacil.net
                                    x-frame-options: SAMEORIGIN
                                    x-xss-protection: 1; mode=block
                                    x-content-type-options: nosniff
                                    referrer-policy: strict-origin-when-cross-origin
                                    x-download-options: noopen
                                    Last-Modified: Fri, 12 Jul 2024 03:37:23 GMT
                                    CF-Cache-Status: HIT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ScnEexOW0olc7WDS1wGAugj7g%2BO89WIcH3dTyQKeyrKxEAAdxLhqbHXQCRLoZnrX8urTLc2hNVYDbMwa0nI%2BMTZD6DBSPqaNsZrj8Wc5cHzENW3Wy6UkTxf2S5ok"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8a1e1ed20cd47332-LHR
                                    Content-Encoding: gzip
                                    alt-svc: h3=":443"; ma=86400
                                  • flag-us
                                    DNS
                                    www.claroideias.com.br
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    www.claroideias.com.br
                                    IN A
                                    Response
                                    www.claroideias.com.br
                                    IN CNAME
                                    vwggv.x.incapdns.net
                                  • flag-us
                                    DNS
                                    8.8.8.8.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    8.8.8.8.in-addr.arpa
                                    IN PTR
                                    Response
                                    8.8.8.8.in-addr.arpa
                                    IN PTR
                                    dnsgoogle
                                  • flag-us
                                    DNS
                                    49.129.67.172.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    49.129.67.172.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    114.1.21.104.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    114.1.21.104.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    172.210.232.199.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    172.210.232.199.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    71.31.126.40.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    71.31.126.40.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    google.com
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    google.com
                                    IN A
                                    Response
                                    google.com
                                    IN A
                                    142.250.200.46
                                  • flag-us
                                    DNS
                                    google.com
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    google.com
                                    IN A
                                    Response
                                    google.com
                                    IN A
                                    142.250.200.46
                                  • flag-us
                                    DNS
                                    99.201.58.216.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    99.201.58.216.in-addr.arpa
                                    IN PTR
                                    Response
                                    99.201.58.216.in-addr.arpa
                                    IN PTR
                                    prg03s02-in-f31e100net
                                    99.201.58.216.in-addr.arpa
                                    IN PTR
                                    lhr48s48-in-f3�G
                                    99.201.58.216.in-addr.arpa
                                    IN PTR
                                    prg03s02-in-f99�G
                                  • flag-us
                                    DNS
                                    58.99.105.20.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    58.99.105.20.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    www.claroideias.com.br
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    www.claroideias.com.br
                                    IN A
                                    Response
                                    www.claroideias.com.br
                                    IN CNAME
                                    vwggv.x.incapdns.net
                                  • flag-us
                                    DNS
                                    103.169.127.40.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    103.169.127.40.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    198.187.3.20.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    198.187.3.20.in-addr.arpa
                                    IN PTR
                                    Response
                                  • flag-us
                                    DNS
                                    147.142.123.92.in-addr.arpa
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    147.142.123.92.in-addr.arpa
                                    IN PTR
                                    Response
                                    147.142.123.92.in-addr.arpa
                                    IN PTR
                                    a92-123-142-147deploystaticakamaitechnologiescom
                                  • flag-us
                                    DNS
                                    www.claroideias.com.br
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    www.claroideias.com.br
                                    IN A
                                    Response
                                    www.claroideias.com.br
                                    IN CNAME
                                    vwggv.x.incapdns.net
                                  • flag-us
                                    DNS
                                    www.claroideias.com.br
                                    msedge.exe
                                    Remote address:
                                    8.8.8.8:53
                                    Request
                                    www.claroideias.com.br
                                    IN A
                                    Response
                                    www.claroideias.com.br
                                    IN CNAME
                                    vwggv.x.incapdns.net
                                  • 172.67.129.49:80
                                    http://www.mestre105.hpg.com.br/2.gif
                                    http
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    1.7kB
                                    3.6kB
                                    12
                                    7

                                    HTTP Request

                                    GET http://www.mestre105.hpg.com.br/nvidiamanager.gif

                                    HTTP Response

                                    301

                                    HTTP Request

                                    GET http://www.mestre105.hpg.com.br/1.gif

                                    HTTP Response

                                    301

                                    HTTP Request

                                    GET http://www.mestre105.hpg.com.br/4.gif

                                    HTTP Response

                                    301

                                    HTTP Request

                                    GET http://www.mestre105.hpg.com.br/2.gif

                                    HTTP Response

                                    301
                                  • 104.21.1.114:443
                                    https://hpg.com.br/
                                    tls, http
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    1.8kB
                                    22.2kB
                                    28
                                    25

                                    HTTP Request

                                    GET https://hpg.com.br/

                                    HTTP Response

                                    200
                                  • 8.8.8.8:53
                                    www.mestre105.hpg.com.br
                                    dns
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    70 B
                                    102 B
                                    1
                                    1

                                    DNS Request

                                    www.mestre105.hpg.com.br

                                    DNS Response

                                    172.67.129.49
                                    104.21.1.114

                                  • 8.8.8.8:53
                                    hpg.com.br
                                    dns
                                    3be90154d43c1e35591834c10ffb1076_JaffaCakes118.exe
                                    56 B
                                    88 B
                                    1
                                    1

                                    DNS Request

                                    hpg.com.br

                                    DNS Response

                                    104.21.1.114
                                    172.67.129.49

                                  • 8.8.8.8:53
                                    www.claroideias.com.br
                                    dns
                                    msedge.exe
                                    68 B
                                    166 B
                                    1
                                    1

                                    DNS Request

                                    www.claroideias.com.br

                                  • 8.8.8.8:53
                                    8.8.8.8.in-addr.arpa
                                    dns
                                    66 B
                                    90 B
                                    1
                                    1

                                    DNS Request

                                    8.8.8.8.in-addr.arpa

                                  • 8.8.8.8:53
                                    49.129.67.172.in-addr.arpa
                                    dns
                                    72 B
                                    134 B
                                    1
                                    1

                                    DNS Request

                                    49.129.67.172.in-addr.arpa

                                  • 8.8.8.8:53
                                    114.1.21.104.in-addr.arpa
                                    dns
                                    71 B
                                    133 B
                                    1
                                    1

                                    DNS Request

                                    114.1.21.104.in-addr.arpa

                                  • 8.8.8.8:53
                                    172.210.232.199.in-addr.arpa
                                    dns
                                    74 B
                                    128 B
                                    1
                                    1

                                    DNS Request

                                    172.210.232.199.in-addr.arpa

                                  • 8.8.8.8:53
                                    71.31.126.40.in-addr.arpa
                                    dns
                                    71 B
                                    157 B
                                    1
                                    1

                                    DNS Request

                                    71.31.126.40.in-addr.arpa

                                  • 8.8.8.8:53
                                    google.com
                                    dns
                                    msedge.exe
                                    56 B
                                    72 B
                                    1
                                    1

                                    DNS Request

                                    google.com

                                    DNS Response

                                    142.250.200.46

                                  • 8.8.8.8:53
                                    google.com
                                    dns
                                    msedge.exe
                                    56 B
                                    72 B
                                    1
                                    1

                                    DNS Request

                                    google.com

                                    DNS Response

                                    142.250.200.46

                                  • 8.8.8.8:53
                                    99.201.58.216.in-addr.arpa
                                    dns
                                    72 B
                                    169 B
                                    1
                                    1

                                    DNS Request

                                    99.201.58.216.in-addr.arpa

                                  • 8.8.8.8:53
                                    58.99.105.20.in-addr.arpa
                                    dns
                                    71 B
                                    157 B
                                    1
                                    1

                                    DNS Request

                                    58.99.105.20.in-addr.arpa

                                  • 224.0.0.251:5353
                                    524 B
                                    8
                                  • 8.8.8.8:53
                                    www.claroideias.com.br
                                    dns
                                    msedge.exe
                                    68 B
                                    166 B
                                    1
                                    1

                                    DNS Request

                                    www.claroideias.com.br

                                  • 8.8.8.8:53
                                    103.169.127.40.in-addr.arpa
                                    dns
                                    73 B
                                    147 B
                                    1
                                    1

                                    DNS Request

                                    103.169.127.40.in-addr.arpa

                                  • 8.8.8.8:53
                                    198.187.3.20.in-addr.arpa
                                    dns
                                    71 B
                                    157 B
                                    1
                                    1

                                    DNS Request

                                    198.187.3.20.in-addr.arpa

                                  • 8.8.8.8:53
                                    147.142.123.92.in-addr.arpa
                                    dns
                                    73 B
                                    139 B
                                    1
                                    1

                                    DNS Request

                                    147.142.123.92.in-addr.arpa

                                  • 8.8.8.8:53
                                    www.claroideias.com.br
                                    dns
                                    msedge.exe
                                    68 B
                                    166 B
                                    1
                                    1

                                    DNS Request

                                    www.claroideias.com.br

                                  • 8.8.8.8:53
                                    www.claroideias.com.br
                                    dns
                                    msedge.exe
                                    68 B
                                    166 B
                                    1
                                    1

                                    DNS Request

                                    www.claroideias.com.br

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    eaaad45aced1889a90a8aa4c39f92659

                                    SHA1

                                    5c0130d9e8d1a64c97924090d9a5258b8a31b83c

                                    SHA256

                                    5e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b

                                    SHA512

                                    0db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    3ee50fb26a9d3f096c47ff8696c24321

                                    SHA1

                                    a8c83e798d2a8b31fec0820560525e80dfa4fe66

                                    SHA256

                                    d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f

                                    SHA512

                                    479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    8a750fc9e3e3beb74278186cda73cc71

                                    SHA1

                                    61906e0eb25560887448fe49ec754ca04797e474

                                    SHA256

                                    fc42d1423c8994ededfdbb428c080799dce3c8c6bdb5d3028a8f89a659ccdada

                                    SHA512

                                    58577498c16a312dc941a778743341198d8ee5335dddcf6d40f7ff88f94659612040f60f9205acbe0a17091beb4e0b9fb6da9b17f2fd3ef68a96c9d618b2ef6f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    aefdbe5a5e565c0baf594ea45134eefa

                                    SHA1

                                    304b503199b89c79714e8391c7655352e686cfa3

                                    SHA256

                                    12f43f6dbf2634232265e2f8334ea029e55ced40e995cb69edfdbfe7e9d245f1

                                    SHA512

                                    7c1195ef398fbdb0bf3b064d1504bc6a974ce5cec3aa914e83cc3de8a1f69642fa29296801d1a715891d4b24d482b2374e8bc70d6d6e5f6bbbee258e8bd9f3a3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    991f3c34551a6aa803a9fdab43b0ce9e

                                    SHA1

                                    7035896fd674bb90f4761e0ca74b4553fae112b0

                                    SHA256

                                    df675df18c7ab7792c78a6a6ffee544398fbba3025bd237a258dfb334dc03531

                                    SHA512

                                    8e604bd96ed7b9306a5f5da4ec18a465eb91d66a532dbe704d18253f750f42b1de2305867a4d37de863d31c5c8b873aacba98c51cb108968242d14a5c890cc30

                                  • C:\new.exe

                                    Filesize

                                    89KB

                                    MD5

                                    0de1dd86852ea85c55ba6205ac230b61

                                    SHA1

                                    8bde249d5e0c73ac83f5c436aa2fdc61967189cb

                                    SHA256

                                    6d2da178b2b652804c0c83066793529e7e8efd2880c4a012f86c63700869dff7

                                    SHA512

                                    6b81a8865f844ec0c56ae68d2ebaed6b30ea0ac2bc9eb9639f031bc60b7737878cedb4ec432e76f3a1557b2129d80abbc69117dde1fc439dc17cb2af87d26266

                                  • memory/3712-0-0x0000000000400000-0x00000000004A4000-memory.dmp

                                    Filesize

                                    656KB

                                  • memory/3712-1-0x0000000002350000-0x0000000002351000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3712-103-0x0000000000400000-0x00000000004A4000-memory.dmp

                                    Filesize

                                    656KB

                                  We care about your privacy.

                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.