Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe
-
Size
512KB
-
MD5
a722f0777d032da6d8cb194a5fa8c241
-
SHA1
69b4b0ea0b10988c8f2f692b101f856a7cafd960
-
SHA256
7ffa13e05eeaf1773743b875187ba4633809f68653953e321eaee0c6d14728d5
-
SHA512
68e17332565d747546b8b821caa4c6816367847c8279afa7af26b3a7625851df10f92a7db9541040824ba3cc363ae61101b4d1d746a31ce9efa6e648c45e4b44
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6u:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5l
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" pzknttupcc.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pzknttupcc.exe -
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pzknttupcc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pzknttupcc.exe -
Executes dropped EXE 5 IoCs
Processes:
pzknttupcc.exengtbhjlyutdupsu.exebdjjkasx.exeqzzwsmlpspkzg.exebdjjkasx.exepid process 3044 pzknttupcc.exe 2668 ngtbhjlyutdupsu.exe 2768 bdjjkasx.exe 2644 qzzwsmlpspkzg.exe 2772 bdjjkasx.exe -
Loads dropped DLL 5 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exepid process 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 3044 pzknttupcc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pzknttupcc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ngtbhjlyutdupsu.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ecvifhjt = "pzknttupcc.exe" ngtbhjlyutdupsu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rwmzwkdv = "ngtbhjlyutdupsu.exe" ngtbhjlyutdupsu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qzzwsmlpspkzg.exe" ngtbhjlyutdupsu.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
bdjjkasx.exebdjjkasx.exepzknttupcc.exedescription ioc process File opened (read-only) \??\q: bdjjkasx.exe File opened (read-only) \??\e: bdjjkasx.exe File opened (read-only) \??\p: bdjjkasx.exe File opened (read-only) \??\w: bdjjkasx.exe File opened (read-only) \??\y: bdjjkasx.exe File opened (read-only) \??\j: pzknttupcc.exe File opened (read-only) \??\n: pzknttupcc.exe File opened (read-only) \??\z: pzknttupcc.exe File opened (read-only) \??\a: bdjjkasx.exe File opened (read-only) \??\b: bdjjkasx.exe File opened (read-only) \??\y: bdjjkasx.exe File opened (read-only) \??\t: bdjjkasx.exe File opened (read-only) \??\i: pzknttupcc.exe File opened (read-only) \??\p: pzknttupcc.exe File opened (read-only) \??\u: pzknttupcc.exe File opened (read-only) \??\e: bdjjkasx.exe File opened (read-only) \??\k: bdjjkasx.exe File opened (read-only) \??\h: bdjjkasx.exe File opened (read-only) \??\g: pzknttupcc.exe File opened (read-only) \??\t: bdjjkasx.exe File opened (read-only) \??\x: bdjjkasx.exe File opened (read-only) \??\z: bdjjkasx.exe File opened (read-only) \??\i: bdjjkasx.exe File opened (read-only) \??\o: bdjjkasx.exe File opened (read-only) \??\r: bdjjkasx.exe File opened (read-only) \??\s: pzknttupcc.exe File opened (read-only) \??\v: bdjjkasx.exe File opened (read-only) \??\l: bdjjkasx.exe File opened (read-only) \??\j: bdjjkasx.exe File opened (read-only) \??\u: bdjjkasx.exe File opened (read-only) \??\k: pzknttupcc.exe File opened (read-only) \??\w: pzknttupcc.exe File opened (read-only) \??\g: bdjjkasx.exe File opened (read-only) \??\v: bdjjkasx.exe File opened (read-only) \??\a: bdjjkasx.exe File opened (read-only) \??\q: bdjjkasx.exe File opened (read-only) \??\l: pzknttupcc.exe File opened (read-only) \??\v: pzknttupcc.exe File opened (read-only) \??\x: pzknttupcc.exe File opened (read-only) \??\l: bdjjkasx.exe File opened (read-only) \??\o: bdjjkasx.exe File opened (read-only) \??\s: bdjjkasx.exe File opened (read-only) \??\h: bdjjkasx.exe File opened (read-only) \??\n: bdjjkasx.exe File opened (read-only) \??\b: bdjjkasx.exe File opened (read-only) \??\w: bdjjkasx.exe File opened (read-only) \??\z: bdjjkasx.exe File opened (read-only) \??\a: pzknttupcc.exe File opened (read-only) \??\h: pzknttupcc.exe File opened (read-only) \??\t: pzknttupcc.exe File opened (read-only) \??\u: bdjjkasx.exe File opened (read-only) \??\y: pzknttupcc.exe File opened (read-only) \??\i: bdjjkasx.exe File opened (read-only) \??\m: bdjjkasx.exe File opened (read-only) \??\k: bdjjkasx.exe File opened (read-only) \??\s: bdjjkasx.exe File opened (read-only) \??\e: pzknttupcc.exe File opened (read-only) \??\o: pzknttupcc.exe File opened (read-only) \??\r: pzknttupcc.exe File opened (read-only) \??\g: bdjjkasx.exe File opened (read-only) \??\n: bdjjkasx.exe File opened (read-only) \??\x: bdjjkasx.exe File opened (read-only) \??\m: pzknttupcc.exe File opened (read-only) \??\q: pzknttupcc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
pzknttupcc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" pzknttupcc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" pzknttupcc.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\ngtbhjlyutdupsu.exe autoit_exe \Windows\SysWOW64\pzknttupcc.exe autoit_exe \Windows\SysWOW64\bdjjkasx.exe autoit_exe \Windows\SysWOW64\qzzwsmlpspkzg.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\pzknttupcc.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ngtbhjlyutdupsu.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bdjjkasx.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll pzknttupcc.exe File created C:\Windows\SysWOW64\pzknttupcc.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File created C:\Windows\SysWOW64\ngtbhjlyutdupsu.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File created C:\Windows\SysWOW64\bdjjkasx.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File created C:\Windows\SysWOW64\qzzwsmlpspkzg.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qzzwsmlpspkzg.exe a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
bdjjkasx.exebdjjkasx.exedescription ioc process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bdjjkasx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bdjjkasx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bdjjkasx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bdjjkasx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal bdjjkasx.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal bdjjkasx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal bdjjkasx.exe -
Drops file in Windows directory 5 IoCs
Processes:
WINWORD.EXEa722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEa722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32432D0D9C2283516D4177D477232DDE7DF664DA" a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBFACAFE10F1E083783B4B86973E98B38A03F04313023CE2CE459C09D6" a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pzknttupcc.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg pzknttupcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat pzknttupcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FC8D4F2A826F9042D72A7DE0BC94E631584767356234D7EA" a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F46BB6FF1D21D1D209D0A68A089011" a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2580 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exebdjjkasx.exengtbhjlyutdupsu.exeqzzwsmlpspkzg.exebdjjkasx.exepid process 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2668 ngtbhjlyutdupsu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exengtbhjlyutdupsu.exebdjjkasx.exeqzzwsmlpspkzg.exebdjjkasx.exepid process 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 2668 ngtbhjlyutdupsu.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exengtbhjlyutdupsu.exebdjjkasx.exeqzzwsmlpspkzg.exebdjjkasx.exepid process 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 3044 pzknttupcc.exe 2668 ngtbhjlyutdupsu.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2768 bdjjkasx.exe 2668 ngtbhjlyutdupsu.exe 2668 ngtbhjlyutdupsu.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2644 qzzwsmlpspkzg.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe 2772 bdjjkasx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2580 WINWORD.EXE 2580 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exepzknttupcc.exeWINWORD.EXEdescription pid process target process PID 2104 wrote to memory of 3044 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe pzknttupcc.exe PID 2104 wrote to memory of 3044 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe pzknttupcc.exe PID 2104 wrote to memory of 3044 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe pzknttupcc.exe PID 2104 wrote to memory of 3044 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe pzknttupcc.exe PID 2104 wrote to memory of 2668 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe ngtbhjlyutdupsu.exe PID 2104 wrote to memory of 2668 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe ngtbhjlyutdupsu.exe PID 2104 wrote to memory of 2668 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe ngtbhjlyutdupsu.exe PID 2104 wrote to memory of 2668 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe ngtbhjlyutdupsu.exe PID 2104 wrote to memory of 2768 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe bdjjkasx.exe PID 2104 wrote to memory of 2768 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe bdjjkasx.exe PID 2104 wrote to memory of 2768 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe bdjjkasx.exe PID 2104 wrote to memory of 2768 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe bdjjkasx.exe PID 2104 wrote to memory of 2644 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe qzzwsmlpspkzg.exe PID 2104 wrote to memory of 2644 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe qzzwsmlpspkzg.exe PID 2104 wrote to memory of 2644 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe qzzwsmlpspkzg.exe PID 2104 wrote to memory of 2644 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe qzzwsmlpspkzg.exe PID 3044 wrote to memory of 2772 3044 pzknttupcc.exe bdjjkasx.exe PID 3044 wrote to memory of 2772 3044 pzknttupcc.exe bdjjkasx.exe PID 3044 wrote to memory of 2772 3044 pzknttupcc.exe bdjjkasx.exe PID 3044 wrote to memory of 2772 3044 pzknttupcc.exe bdjjkasx.exe PID 2104 wrote to memory of 2580 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe WINWORD.EXE PID 2104 wrote to memory of 2580 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe WINWORD.EXE PID 2104 wrote to memory of 2580 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe WINWORD.EXE PID 2104 wrote to memory of 2580 2104 a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe WINWORD.EXE PID 2580 wrote to memory of 484 2580 WINWORD.EXE splwow64.exe PID 2580 wrote to memory of 484 2580 WINWORD.EXE splwow64.exe PID 2580 wrote to memory of 484 2580 WINWORD.EXE splwow64.exe PID 2580 wrote to memory of 484 2580 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a722f0777d032da6d8cb194a5fa8c241_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\pzknttupcc.exepzknttupcc.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\bdjjkasx.exeC:\Windows\system32\bdjjkasx.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\ngtbhjlyutdupsu.exengtbhjlyutdupsu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\bdjjkasx.exebdjjkasx.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\qzzwsmlpspkzg.exeqzzwsmlpspkzg.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
7Impair Defenses
2Disable or Modify Tools
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exeFilesize
512KB
MD5024a671a01dabe9c24f8ce729d8eddd7
SHA1285354595309d5b1c321743df8e2078cdb4bfbf5
SHA2563d5d4c380e4f289918709cf16101c7f0f10be81a504eeeb542bc3fc3aa8b2ab8
SHA5123eadddd8fdc678e434196ecc7866660bfa4b073ccdb986706e6c1696297930dee00f1616deb08e93734026bad53c5fadb2f34c4f4755607a5f7e797dd7311ba7
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exeFilesize
512KB
MD596e3475392b76e1e5271d7728d5f8924
SHA1ea198dc796ca9431dd5f3cd5e262d225a92a997a
SHA2565e9128a0d8259ea2b4367c731989d08b5c2003cef2492ecd3553350a13de8c75
SHA5122c7bcec90fa35af4c55f73025870e0968ec4e038c802fc8d40113c8bc6b92c69e5f509aeb8dc3b86bfe876aa09042b45fcdb831b7f6d7323df4f6545a49dbfe4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotmFilesize
20KB
MD58104390275feb34118b3dc861f355c47
SHA1fdade20d59c1e401929e921bde4f149c34d5aa2b
SHA25635eb08a590af3ffe4b94154d3c5ea1c9cccc3c2dfe2e73f4f61977878b1a388b
SHA512859ccd5c6b59ae5b96b09fc7fa81c9110f5bbd3b0af25e8b6e95d1fcfa36a88decc8bc2c5cb1b32f4747f1ce8b28a4cd0b834fff54892b2bd77df2694d15ef09
-
C:\Windows\SysWOW64\ngtbhjlyutdupsu.exeFilesize
512KB
MD58587b0ec35998fe0e8777efa97452740
SHA1d4b0c8514be947afe82bcd2136b638e172678e0b
SHA2566fe71d31aef59127a5d12c41b38be64e775043ca9fc0d6fe624fd3f0af1137de
SHA512316481c6873f8d8d46c3c2eb72a4789b14e85d993099aa30944f4bb52e38eb1e46cb31619ee5ee8d3c02adda296de8cad431ed6b1d663dd802cd270e2e4809eb
-
C:\Windows\mydoc.rtfFilesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
\Windows\SysWOW64\bdjjkasx.exeFilesize
512KB
MD55b196749b960bf74b6038ab087c37098
SHA1d5bf949a54e52ca8ffa7890d31d990c312cc826c
SHA25602f2260fbcee0e873e430c2b508be3972f80291beff28c702de83f25dbcb531e
SHA512e78eeffe1116db9d270d550a6acc85f96d524c5a9d3022ddd9a56e6638eab310ee8460fdb31f30dd161852bdf5a9530a65a64b61760b37b3ce8205c09f721331
-
\Windows\SysWOW64\pzknttupcc.exeFilesize
512KB
MD53b42d3787db2daf429a3b65bf086ce94
SHA144fa2f94f8ef9e2f71526a0f3e04a55f6a7c991e
SHA256bec9313619e10a80e21b6b1d9ee04340325ad412a874eb288bb9a56babbf36fd
SHA51232cb0f64074125b177e6a7e42cb3d548424b886603ff7db7c9e9aab076b3c06a4e4cbb2612beccbcdedc4dd695f3e18dff1b7a4de8ad4e7aef6a821bf6f0acd1
-
\Windows\SysWOW64\qzzwsmlpspkzg.exeFilesize
512KB
MD561ffbba6429612bca6a70f78a2394f4d
SHA11062b433c09b0e7e6b3a3d43e81323cbb444863f
SHA25656984bfaa4d37e78e2dde13ac6a29cfe4565f5479ed43e82a56a9cdef78d9146
SHA512d4892c6bcd8602a094971eb230366290b709594167e2c8e54cefa039caad784542a608e96020399f7af06d063d02492671e6370e75b98ccb75138ad84f3f062f
-
memory/2104-0-0x0000000000400000-0x0000000000496000-memory.dmpFilesize
600KB
-
memory/2580-45-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2580-105-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB