Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 09:02 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e26334f2ea91fb3d75105d702dd041bb.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e26334f2ea91fb3d75105d702dd041bb.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e26334f2ea91fb3d75105d702dd041bb.html
-
Size
83KB
-
MD5
e26334f2ea91fb3d75105d702dd041bb
-
SHA1
4dca3fb40e15a0fcae4c82c6f22875b7660b7e39
-
SHA256
4d880215aeb7036724cd2da3653e65dbce27ef3ad5d80e654b337f539b3de10c
-
SHA512
8c63ddea7cd8622e19c4965003521466907ade38a343e7fad23f633bf61e7328d5a647518932c99993c7fdfe57ed429a24fd9ed73bffd9e20ac05ae703e3c12a
-
SSDEEP
1536:SB3mIJgDyIPaFKG60B9r4Ejw3+pF96+XYAMzaLN4zhF24H1+JPgz9nIKF/EvgPV7:SH3hwDWcv2y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2968 msedge.exe 2968 msedge.exe 3900 identity_helper.exe 3900 identity_helper.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2556 2968 msedge.exe 83 PID 2968 wrote to memory of 2556 2968 msedge.exe 83 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 452 2968 msedge.exe 84 PID 2968 wrote to memory of 2688 2968 msedge.exe 85 PID 2968 wrote to memory of 2688 2968 msedge.exe 85 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86 PID 2968 wrote to memory of 3604 2968 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26334f2ea91fb3d75105d702dd041bb.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffe241846f8,0x7ffe24184708,0x7ffe241847182⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17098684421338298604,18278640145651618924,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestwww.turkhackteam.netIN AResponsewww.turkhackteam.netIN A104.21.48.1www.turkhackteam.netIN A104.21.64.1www.turkhackteam.netIN A104.21.16.1www.turkhackteam.netIN A104.21.32.1www.turkhackteam.netIN A104.21.80.1www.turkhackteam.netIN A104.21.112.1www.turkhackteam.netIN A104.21.96.1
-
Remote address:8.8.8.8:53Requestxslt.alexa.comIN AResponse
-
Remote address:8.8.8.8:53Requestwhos.amung.usIN AResponsewhos.amung.usIN A104.22.75.171whos.amung.usIN A104.22.74.171whos.amung.usIN A172.67.8.141
-
Remote address:8.8.8.8:53Requestimg43.imageshack.usIN AResponseimg43.imageshack.usIN CNAMEimagizer-cv.imageshack.usimagizer-cv.imageshack.usIN A38.99.77.17imagizer-cv.imageshack.usIN A38.99.77.16
-
Remote address:104.21.48.1:80RequestGET /images/smilies/wink.gif HTTP/1.1
Host: www.turkhackteam.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Mon, 20 Jan 2025 10:02:22 GMT
Location: https://www.turkhackteam.net/images/smilies/wink.gif
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xte9l2xlTVmBUQDxbQSkr4BTQykKl69TwQ2OINvjbbOBodb2doM9jx559Dq9VOvWIeUeRtrG%2FYXe1ySgPIXH3HjUfghTUFcEGsm2LdjEOOGtqYnhNWtPEtWjWv7dLdvxVzzDRJWMjg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Vary: Accept-Encoding
Server: cloudflare
CF-RAY: 904de29ddc3b951d-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=47302&min_rtt=47302&rtt_var=23651&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=374&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
-
Remote address:104.21.48.1:80RequestGET /images/smilies/smile.gif HTTP/1.1
Host: www.turkhackteam.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Mon, 20 Jan 2025 10:02:22 GMT
Location: https://www.turkhackteam.net/images/smilies/smile.gif
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iH%2B1eHh2AL%2BQvT9NnkX4ap9IRHedcAboZJQeTVy5RlLN1PM9FPK%2FNuteImIiRXuE4OuPy9%2BSOpgk%2FlCVznAaOVer61jhBwizYqxxSJfnW4SrImXsCb6fSG6MS4kxkRwcwoi7bCrBNw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Vary: Accept-Encoding
Server: cloudflare
CF-RAY: 904de29ddc3a951d-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=47317&min_rtt=47317&rtt_var=23658&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=375&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
-
Remote address:38.99.77.17:80RequestGET /img43/523/naberv.jpg HTTP/1.1
Host: img43.imageshack.us
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 404 Not Found
Date: Mon, 20 Jan 2025 09:02:22 GMT
Content-Type: text/html
Content-Length: 570
Connection: keep-alive
Access-Control-Allow-Methods: GET, HEAD, OPTIONS
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers: Authorization,Content-Type,Accept,Origin,User-Agent,DNT,Cache-Control,X-Mx-ReqToken,Keep-Alive,X-Requested-With,If-Modified-Since
Access-Control-Expose-Headers: Authorization,Content-Type,Accept,Origin,User-Agent,DNT,Cache-Control,X-Mx-ReqToken,Keep-Alive,X-Requested-With,If-Modified-Since
-
Remote address:104.22.75.171:80RequestGET /widget/zuoemhd0i7fi.png HTTP/1.1
Host: whos.amung.us
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 307 Temporary Redirect
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
cache-control: no-cache, no-store, must-revalidate
location: http://widgets.amung.us/classic/00/1.png
cf-cache-status: DYNAMIC
Server: cloudflare
CF-RAY: 904de29e2a1963b2-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:104.21.48.1:443RequestGET /images/smilies/smile.gif HTTP/2.0
host: www.turkhackteam.net
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 301
content-type: text/html
location: https://www.turkhackteam.org/images/smilies/smile.gif
strict-transport-security: max-age=31536000
cache-control: max-age=691200
cf-cache-status: EXPIRED
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XvN2sjaVVF1aLWYCdlwntiNHGNzT4Mlfee2qjOmUxdTrOMY10M3HiJCg1f0tkiRX65Y3Ix9c70picRKG1v8X51ZS1jqENu9UtKmgU51TDpKkGwsWtyU1hhFbjnMfpv5eSy3Yil2REA%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
server: cloudflare
cf-ray: 904de29f790f4179-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=47479&min_rtt=47475&rtt_var=17806&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2859&recv_bytes=1049&delivery_rate=57166&cwnd=251&unsent_bytes=0&cid=5a19827b8da30197&ts=94&x=0"
-
Remote address:104.21.48.1:443RequestGET /images/smilies/wink.gif HTTP/2.0
host: www.turkhackteam.net
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 301
content-type: text/html
location: https://www.turkhackteam.org/images/smilies/wink.gif
strict-transport-security: max-age=31536000
cache-control: max-age=691200
cf-cache-status: EXPIRED
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jWyCaOiXCXdefa0Tp3NBTULBxpat7bynv7rTpQ5UjonGZgNMzuwX4Tud4ic3bpcdfULND9zlela0iIGTA2xMWx4ok3rjruDY90J5hjuMkVa6Y7uHV%2B6nPEO8646ABWN4yNn7ZFdStg%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
server: cloudflare
cf-ray: 904de29f79104179-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=47479&min_rtt=47475&rtt_var=17806&sent=9&recv=8&lost=0&retrans=0&sent_bytes=4378&recv_bytes=1049&delivery_rate=57166&cwnd=251&unsent_bytes=0&cid=5a19827b8da30197&ts=104&x=0"
-
Remote address:8.8.8.8:53Requestsrv.sayyac.netIN AResponsesrv.sayyac.netIN A31.186.15.180
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request60.153.16.2.in-addr.arpaIN PTRResponse60.153.16.2.in-addr.arpaIN PTRa2-16-153-60deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request171.75.22.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.48.21.104.in-addr.arpaIN PTRResponse
-
Remote address:31.186.15.180:80RequestGET /sa.js?_salogin=thtorg123&_sav=4.2 HTTP/1.1
Host: srv.sayyac.net
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
Intervention: <https://permanently-removed.invalid/feature/5718547946799104>; level="warning"
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Date: Mon, 20 Jan 2025 09:02:22 GMT
Content-Type: application/x-javascript
Content-Length: 0
Last-Modified: Wed, 16 Mar 2022 13:03:07 GMT
Connection: close
ETag: "6231e00b-0"
Expires: Thu, 31 Dec 2037 23:55:55 GMT
Cache-Control: max-age=315360000
Cache-Control: public
P3P: policyref="/w3c/p3p.xml", CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Requestwidgets.amung.usIN AResponsewidgets.amung.usIN A104.22.75.171widgets.amung.usIN A172.67.8.141widgets.amung.usIN A104.22.74.171
-
Remote address:8.8.8.8:53Requestwww.turkhackteam.orgIN AResponsewww.turkhackteam.orgIN A172.67.211.30www.turkhackteam.orgIN A104.21.91.65
-
Remote address:104.22.75.171:80RequestGET /classic/00/1.png HTTP/1.1
Host: widgets.amung.us
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 1349
Connection: keep-alive
last-modified: Sun, 13 Jun 2010 09:03:09 GMT
etag: "4c149ecd-545"
expires: Fri, 17 Jan 2025 20:18:16 GMT
cache-control: max-age=2678400
access-control-allow-origin: *
CF-Cache-Status: HIT
Age: 305046
Accept-Ranges: bytes
Vary: Accept-Encoding
Server: cloudflare
CF-RAY: 904de2a05a1763cd-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:172.67.211.30:443RequestGET /images/smilies/smile.gif HTTP/2.0
host: www.turkhackteam.org
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: image/gif
content-length: 1061
cache-control: public, max-age=691200
expires: Mon, 27 Jan 2025 00:23:19 GMT
last-modified: Fri, 11 Nov 2011 22:34:08 GMT
strict-transport-security: max-age=15552000; preload
alt-svc: h3=":443"; ma=86400
cf-cache-status: HIT
age: 31143
accept-ranges: bytes
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e1oCPi7no4D8oT9VAdXGrgDyYX%2B9PAnL%2BvyerKizVmlD45oisUX%2Bh5qsFmW4gLKHIUkZyN2ldRmQGhy33%2B24RMBhixC3Udj55XKKShtO7u6wX60frMos3byaNlRAm80ZDXLj7JbLPw%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
server: cloudflare
cf-ray: 904de2a11a629433-LHR
server-timing: cfL4;desc="?proto=TCP&rtt=47570&min_rtt=47398&rtt_var=18119&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2904&recv_bytes=1049&delivery_rate=55638&cwnd=247&unsent_bytes=0&cid=2060ccabf9dd42a1&ts=97&x=0"
-
Remote address:172.67.211.30:443RequestGET /images/smilies/wink.gif HTTP/2.0
host: www.turkhackteam.org
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: image/gif
content-length: 1062
cache-control: public, max-age=691200
expires: Mon, 27 Jan 2025 00:23:19 GMT
last-modified: Fri, 11 Nov 2011 22:34:08 GMT
strict-transport-security: max-age=15552000; preload
alt-svc: h3=":443"; ma=86400
cf-cache-status: HIT
age: 31143
accept-ranges: bytes
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d5hLRVS6cqJPYeq12Lg1yiFz4yHN8%2BeJU0JkWUnP1qyVmKfUUj8WV2rnVBpSbDkZTofGFnY0hQx4vR6xan5NILCN18S4d2uJ%2FmiB9Adj14VVM833NSzGQBBElQgv1gP34yrNb9v4Fw%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
server: cloudflare
cf-ray: 904de2a12a669433-LHR
server-timing: cfL4;desc="?proto=TCP&rtt=47570&min_rtt=47398&rtt_var=18119&sent=9&recv=8&lost=0&retrans=0&sent_bytes=4727&recv_bytes=1049&delivery_rate=55638&cwnd=247&unsent_bytes=0&cid=2060ccabf9dd42a1&ts=98&x=0"
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request17.77.99.38.in-addr.arpaIN PTRResponse17.77.99.38.in-addr.arpaIN PTRimagizer-cv imageshackus
-
Remote address:8.8.8.8:53Request180.15.186.31.in-addr.arpaIN PTRResponse180.15.186.31.in-addr.arpaIN PTRreverse-31-186-15-180turkticaretnet
-
Remote address:8.8.8.8:53Request30.211.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request32.187.41.23.in-addr.arpaIN PTRResponse32.187.41.23.in-addr.arpaIN PTRa23-41-187-32deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request175.117.168.52.in-addr.arpaIN PTRResponse
-
696 B 1.4kB 7 6
HTTP Request
GET http://www.turkhackteam.net/images/smilies/wink.gifHTTP Response
301 -
697 B 1.4kB 7 6
HTTP Request
GET http://www.turkhackteam.net/images/smilies/smile.gifHTTP Response
301 -
600 B 1.3kB 5 4
HTTP Request
GET http://img43.imageshack.us/img43/523/naberv.jpgHTTP Response
404 -
689 B 667 B 7 6
HTTP Request
GET http://whos.amung.us/widget/zuoemhd0i7fi.pngHTTP Response
307 -
943 B 3.1kB 8 6
-
1.8kB 6.4kB 17 17
HTTP Request
GET https://www.turkhackteam.net/images/smilies/smile.gifHTTP Request
GET https://www.turkhackteam.net/images/smilies/wink.gifHTTP Response
301HTTP Response
301 -
653 B 608 B 5 4
HTTP Request
GET http://srv.sayyac.net/sa.js?_salogin=thtorg123&_sav=4.2HTTP Response
200 -
685 B 2.1kB 7 7
HTTP Request
GET http://widgets.amung.us/classic/00/1.pngHTTP Response
200 -
1.8kB 7.0kB 17 17
HTTP Request
GET https://www.turkhackteam.org/images/smilies/smile.gifHTTP Request
GET https://www.turkhackteam.org/images/smilies/wink.gifHTTP Response
200HTTP Response
200 -
897 B 2.6kB 7 5
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
66 B 178 B 1 1
DNS Request
www.turkhackteam.net
DNS Response
104.21.48.1104.21.64.1104.21.16.1104.21.32.1104.21.80.1104.21.112.1104.21.96.1
-
60 B 142 B 1 1
DNS Request
xslt.alexa.com
-
59 B 107 B 1 1
DNS Request
whos.amung.us
DNS Response
104.22.75.171104.22.74.171172.67.8.141
-
65 B 123 B 1 1
DNS Request
img43.imageshack.us
DNS Response
38.99.77.1738.99.77.16
-
60 B 76 B 1 1
DNS Request
srv.sayyac.net
DNS Response
31.186.15.180
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
60.153.16.2.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
171.75.22.104.in-addr.arpa
-
70 B 132 B 1 1
DNS Request
1.48.21.104.in-addr.arpa
-
62 B 110 B 1 1
DNS Request
widgets.amung.us
DNS Response
104.22.75.171172.67.8.141104.22.74.171
-
66 B 98 B 1 1
DNS Request
www.turkhackteam.org
DNS Response
172.67.211.30104.21.91.65
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
70 B 109 B 1 1
DNS Request
17.77.99.38.in-addr.arpa
-
72 B 123 B 1 1
DNS Request
180.15.186.31.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
30.211.67.172.in-addr.arpa
-
453 B 7
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
32.187.41.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
175.117.168.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
266B
MD547d0b22df24ee3fa67570b0f3473efaf
SHA137ad6e964621e7b20160d11f941a512af26408a3
SHA2562151fc50fa718cfa763e0c351589fdf2c075a66a614bbcebfa488cdacc231159
SHA5124512d786bb895dd916df77d11c8a17a469aec2d430728346c0023e10089fc9405e9b8a70e07ad468611df31eaccdd01ec87afcabbe7692cfd9f520a3c8a90b52
-
Filesize
6KB
MD5ddcc6ef2c78a106fe5bf5ab7fe51e1e8
SHA15fa232ba81c2a46c1f58edf37a465c60158f233e
SHA2565ae429363ce20fa00e3c5489a1ee4b9b9573a1c9f253009f3e0a5dfa9487f541
SHA51283d1b018fb7f9c2c587948ff6374a936a54a37852fcb4b660ccf61edcdf19fb3cf2e2f57733936a130620b914a2a7945adc41b83596481343ff03a5cefa56cc0
-
Filesize
5KB
MD5b12c256ce89bc61104e8c01b4de0e359
SHA18263faf37bfcc8b4ec7de871228ee0ae8388db7e
SHA256c472adf7b598988ebbe13b3d27d1aefa6876c70f4069551ca15dcd02eb417214
SHA512cdfabbb17c57e9081df60ed0a2561ffc3f1f8170908a8ed8dd25cd89552f0d899699a06e03764bad27f909533dcacd5a13feab20a08988c77b4c8d60cfc405a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b1b8f406498cd1d9f91cf22336b3224c
SHA1455d113a5f003d08da69f20c156e887ba36d5a3a
SHA25659ec474f995658c60ff56551fd85b640915e427abdc7466bd5e55dbadc6f5583
SHA51201bd36b411a1678a1c2540d592c0d350c669f840af7ba4773aa401cde7bd20b5a5e2ecb6f9184a1cd62b47ccbb98695a64c748fc68029ca0fda08c2709f98bfa