Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 02:02
Behavioral task
behavioral1
Sample
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
0421728aa1023b96c1ac4f2b649d4cd0
-
SHA1
1b99703d1c8afbd8d5cfcea3edf8f4be23d8945c
-
SHA256
b28dd3a787364975e6f6fb47c2497c765b9015b2d595033dc934fd09430d5ad4
-
SHA512
ac024c23ea808a93155563507e5657e2b4fb0f90f76e44e2db423c60b7df5724f729c5317ca1f59329f6138d1560bcac4000b1dd4c0d98ad18f845d9af677ea6
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZA:0UzeyQMS4DqodCnoe+iitjWww8
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exepid process 3516 explorer.exe 3764 explorer.exe 4136 spoolsv.exe 2372 spoolsv.exe 3596 spoolsv.exe 4548 spoolsv.exe 4676 spoolsv.exe 1036 spoolsv.exe 4456 spoolsv.exe 4728 spoolsv.exe 1456 spoolsv.exe 2832 spoolsv.exe 372 spoolsv.exe 388 spoolsv.exe 3584 spoolsv.exe 4588 spoolsv.exe 544 spoolsv.exe 404 spoolsv.exe 3812 spoolsv.exe 1408 spoolsv.exe 3196 spoolsv.exe 452 spoolsv.exe 1248 spoolsv.exe 4420 spoolsv.exe 4508 spoolsv.exe 4884 spoolsv.exe 4840 spoolsv.exe 1716 spoolsv.exe 60 spoolsv.exe 2952 spoolsv.exe 3060 spoolsv.exe 1256 spoolsv.exe 2672 spoolsv.exe 3476 spoolsv.exe 3256 spoolsv.exe 3032 spoolsv.exe 2396 spoolsv.exe 3308 spoolsv.exe 3416 explorer.exe 3604 spoolsv.exe 3992 spoolsv.exe 1592 spoolsv.exe 4912 spoolsv.exe 4140 spoolsv.exe 2380 spoolsv.exe 432 spoolsv.exe 1884 spoolsv.exe 224 spoolsv.exe 4040 explorer.exe 3772 spoolsv.exe 376 spoolsv.exe 2972 spoolsv.exe 3976 spoolsv.exe 3652 spoolsv.exe 3288 spoolsv.exe 4836 spoolsv.exe 3968 spoolsv.exe 2328 spoolsv.exe 4908 spoolsv.exe 2156 spoolsv.exe 208 spoolsv.exe 1032 explorer.exe 3636 spoolsv.exe 2456 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 61 IoCs
Processes:
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exedescription pid process target process PID 4964 set thread context of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 3516 set thread context of 3764 3516 explorer.exe explorer.exe PID 4136 set thread context of 3308 4136 spoolsv.exe spoolsv.exe PID 2372 set thread context of 3604 2372 spoolsv.exe spoolsv.exe PID 3596 set thread context of 3992 3596 spoolsv.exe spoolsv.exe PID 4548 set thread context of 1592 4548 spoolsv.exe spoolsv.exe PID 4676 set thread context of 4140 4676 spoolsv.exe spoolsv.exe PID 1036 set thread context of 2380 1036 spoolsv.exe spoolsv.exe PID 4456 set thread context of 432 4456 spoolsv.exe spoolsv.exe PID 4728 set thread context of 1884 4728 spoolsv.exe spoolsv.exe PID 1456 set thread context of 224 1456 spoolsv.exe spoolsv.exe PID 2832 set thread context of 3772 2832 spoolsv.exe spoolsv.exe PID 372 set thread context of 376 372 spoolsv.exe spoolsv.exe PID 388 set thread context of 2972 388 spoolsv.exe spoolsv.exe PID 3584 set thread context of 3976 3584 spoolsv.exe spoolsv.exe PID 4588 set thread context of 3652 4588 spoolsv.exe spoolsv.exe PID 544 set thread context of 4836 544 spoolsv.exe spoolsv.exe PID 404 set thread context of 3968 404 spoolsv.exe spoolsv.exe PID 3812 set thread context of 2328 3812 spoolsv.exe spoolsv.exe PID 1408 set thread context of 4908 1408 spoolsv.exe spoolsv.exe PID 3196 set thread context of 2156 3196 spoolsv.exe spoolsv.exe PID 452 set thread context of 208 452 spoolsv.exe spoolsv.exe PID 1248 set thread context of 2456 1248 spoolsv.exe spoolsv.exe PID 4420 set thread context of 2060 4420 spoolsv.exe spoolsv.exe PID 4508 set thread context of 2272 4508 spoolsv.exe spoolsv.exe PID 4884 set thread context of 3956 4884 spoolsv.exe spoolsv.exe PID 4840 set thread context of 4312 4840 spoolsv.exe spoolsv.exe PID 1716 set thread context of 5084 1716 spoolsv.exe spoolsv.exe PID 60 set thread context of 2264 60 spoolsv.exe spoolsv.exe PID 2952 set thread context of 708 2952 spoolsv.exe spoolsv.exe PID 3060 set thread context of 2468 3060 spoolsv.exe spoolsv.exe PID 1256 set thread context of 3792 1256 spoolsv.exe spoolsv.exe PID 2672 set thread context of 3856 2672 spoolsv.exe spoolsv.exe PID 3476 set thread context of 3844 3476 spoolsv.exe spoolsv.exe PID 3256 set thread context of 1852 3256 spoolsv.exe spoolsv.exe PID 3032 set thread context of 3372 3032 spoolsv.exe spoolsv.exe PID 2396 set thread context of 3612 2396 spoolsv.exe spoolsv.exe PID 3416 set thread context of 3548 3416 explorer.exe explorer.exe PID 4912 set thread context of 3816 4912 spoolsv.exe spoolsv.exe PID 4040 set thread context of 5040 4040 explorer.exe explorer.exe PID 3288 set thread context of 1616 3288 spoolsv.exe spoolsv.exe PID 1032 set thread context of 4424 1032 explorer.exe explorer.exe PID 3636 set thread context of 3252 3636 spoolsv.exe spoolsv.exe PID 2524 set thread context of 4232 2524 explorer.exe explorer.exe PID 4216 set thread context of 4784 4216 spoolsv.exe spoolsv.exe PID 4992 set thread context of 4380 4992 explorer.exe explorer.exe PID 1040 set thread context of 4316 1040 spoolsv.exe spoolsv.exe PID 1416 set thread context of 228 1416 spoolsv.exe spoolsv.exe PID 4204 set thread context of 2128 4204 explorer.exe explorer.exe PID 1260 set thread context of 4220 1260 spoolsv.exe spoolsv.exe PID 468 set thread context of 2212 468 spoolsv.exe spoolsv.exe PID 2292 set thread context of 3068 2292 spoolsv.exe spoolsv.exe PID 3460 set thread context of 2920 3460 explorer.exe explorer.exe PID 876 set thread context of 3056 876 spoolsv.exe spoolsv.exe PID 2192 set thread context of 1800 2192 spoolsv.exe spoolsv.exe PID 4832 set thread context of 2184 4832 spoolsv.exe spoolsv.exe PID 1316 set thread context of 2216 1316 spoolsv.exe spoolsv.exe PID 2332 set thread context of 3280 2332 spoolsv.exe spoolsv.exe PID 624 set thread context of 1148 624 spoolsv.exe spoolsv.exe PID 5076 set thread context of 1856 5076 spoolsv.exe spoolsv.exe PID 4704 set thread context of 528 4704 explorer.exe explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exe0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exeexplorer.exepid process 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 3764 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3764 explorer.exe 3308 spoolsv.exe 3308 spoolsv.exe 3604 spoolsv.exe 3604 spoolsv.exe 3992 spoolsv.exe 3992 spoolsv.exe 1592 spoolsv.exe 1592 spoolsv.exe 4140 spoolsv.exe 4140 spoolsv.exe 2380 spoolsv.exe 2380 spoolsv.exe 432 spoolsv.exe 432 spoolsv.exe 1884 spoolsv.exe 1884 spoolsv.exe 224 spoolsv.exe 224 spoolsv.exe 3772 spoolsv.exe 3772 spoolsv.exe 376 spoolsv.exe 376 spoolsv.exe 2972 spoolsv.exe 2972 spoolsv.exe 3976 spoolsv.exe 3976 spoolsv.exe 3652 spoolsv.exe 3652 spoolsv.exe 4836 spoolsv.exe 4836 spoolsv.exe 3968 spoolsv.exe 3968 spoolsv.exe 2328 spoolsv.exe 2328 spoolsv.exe 4908 spoolsv.exe 4908 spoolsv.exe 2156 spoolsv.exe 2156 spoolsv.exe 208 spoolsv.exe 208 spoolsv.exe 2456 spoolsv.exe 2456 spoolsv.exe 2060 spoolsv.exe 2060 spoolsv.exe 2272 spoolsv.exe 2272 spoolsv.exe 3956 spoolsv.exe 3956 spoolsv.exe 4312 spoolsv.exe 4312 spoolsv.exe 5084 spoolsv.exe 5084 spoolsv.exe 2264 spoolsv.exe 2264 spoolsv.exe 708 spoolsv.exe 708 spoolsv.exe 2468 spoolsv.exe 2468 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 4964 wrote to memory of 4644 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe splwow64.exe PID 4964 wrote to memory of 4644 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe splwow64.exe PID 4964 wrote to memory of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 4964 wrote to memory of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 4964 wrote to memory of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 4964 wrote to memory of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 4964 wrote to memory of 744 4964 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe PID 744 wrote to memory of 3516 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe explorer.exe PID 744 wrote to memory of 3516 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe explorer.exe PID 744 wrote to memory of 3516 744 0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe explorer.exe PID 3516 wrote to memory of 3764 3516 explorer.exe explorer.exe PID 3516 wrote to memory of 3764 3516 explorer.exe explorer.exe PID 3516 wrote to memory of 3764 3516 explorer.exe explorer.exe PID 3516 wrote to memory of 3764 3516 explorer.exe explorer.exe PID 3516 wrote to memory of 3764 3516 explorer.exe explorer.exe PID 3764 wrote to memory of 4136 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4136 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4136 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3596 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3596 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3596 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4548 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4548 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4548 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4676 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4676 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4676 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1036 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1036 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1036 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4728 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4728 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4728 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 1456 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2832 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2832 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 2832 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 372 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 388 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 388 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 388 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3584 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3584 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3584 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4588 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4588 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 4588 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 544 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 544 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 544 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 404 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 404 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 404 3764 explorer.exe spoolsv.exe PID 3764 wrote to memory of 3812 3764 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0421728aa1023b96c1ac4f2b649d4cd0_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4136 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3416 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3548
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3604 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4140 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4456 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1456 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:224 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4040 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5040
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3772 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:376 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:388 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3584 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3976 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3652 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4836 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3812 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2328 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1408 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4908 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:208 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1032 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4424
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1248 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4420 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2060 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2272 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3956 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4312 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2524 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4232
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5084 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:60 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2264 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2952 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:708 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2468 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:4992 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4380
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3792
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3856
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3844
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1852
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3372
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4204 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2128
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3612
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:3460 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2920
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3816
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4704 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:528
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1616
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4060 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3252
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:4216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4784
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4996
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4316
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3400 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:228
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4220
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2212
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:2292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3068
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2400 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3056
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1800
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2184
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2216
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1180 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:2332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3280
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1148
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3600
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1856
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3184 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4072
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4532
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4296
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1876 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3392
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4672 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3200 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5068 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4348 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3364 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1192 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4068
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3696 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2248 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5036
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2428 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD54ff3dbf8ad536d407622010fc76bf2f4
SHA1389f2cd4ca5d6a4bf2e4aadf93fba125ce4da4c9
SHA256291a9a03513bc1517eccc643dd9fea664bdce2843dcfc3dfcc408bb6eb99bf02
SHA51237cc5da07143518f446341cfe3e44034a9ecd28368ed17c70ecb546af8fd319dc066b35fa322bbbe327d2408229aaab32a6758100006cc432a105d27357d55d8
-
Filesize
2.2MB
MD59c41a2137bb1236a12ffaa54bddd7da6
SHA11995633072deb929c62f0eea695ae2da3f9a440a
SHA2560291bdfcd9eefc6c580efce7e36f2aade6195480c9cc30fb3d2a1754b31ef669
SHA512d148f72729038e80d1ddedb24d40dc0c960d1d01c928afa8c42f0fadf44bc8dcb5b9af2a08c07436c0fbd4171f848a3ddabe85a90df9833dc5c05b90f1b08a85