Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 07:13
Behavioral task
behavioral1
Sample
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
04a64c3a6e62def229e162d97089512f
-
SHA1
6931e468d1174f171e130ba9dd9304ac76e8aa17
-
SHA256
aba1938a2d8d34b9b15829de7ffe3e6c3956e7bfc865d8fe57087873dca947e3
-
SHA512
c76f6c48704fb96b58ad517cf798742033d21499e58d712d6aea21b3344c40531b4b8b94df628cb76f91ae597a654a97b3cf465e6257380cf0b5d200334b6321
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZw:0UzeyQMS4DqodCnoe+iitjWwwc
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2256 explorer.exe 636 explorer.exe 1036 spoolsv.exe 2636 spoolsv.exe 4736 spoolsv.exe 4128 spoolsv.exe 3768 spoolsv.exe 2924 spoolsv.exe 3144 spoolsv.exe 2928 spoolsv.exe 3484 spoolsv.exe 3028 spoolsv.exe 3892 spoolsv.exe 2176 spoolsv.exe 2052 spoolsv.exe 2208 spoolsv.exe 3948 spoolsv.exe 4772 spoolsv.exe 2144 spoolsv.exe 436 spoolsv.exe 4800 spoolsv.exe 2732 spoolsv.exe 1076 spoolsv.exe 228 spoolsv.exe 2524 spoolsv.exe 900 spoolsv.exe 4680 spoolsv.exe 1424 spoolsv.exe 2728 spoolsv.exe 1432 spoolsv.exe 4904 spoolsv.exe 916 spoolsv.exe 1548 spoolsv.exe 392 spoolsv.exe 3920 spoolsv.exe 2744 spoolsv.exe 3516 spoolsv.exe 3336 spoolsv.exe 2592 spoolsv.exe 4912 spoolsv.exe 4364 spoolsv.exe 4676 spoolsv.exe 3220 spoolsv.exe 4524 spoolsv.exe 3272 spoolsv.exe 3644 spoolsv.exe 2392 spoolsv.exe 1636 spoolsv.exe 4764 spoolsv.exe 2584 explorer.exe 2972 spoolsv.exe 4116 spoolsv.exe 5232 spoolsv.exe 5436 spoolsv.exe 5500 spoolsv.exe 5596 spoolsv.exe 5676 spoolsv.exe 5788 spoolsv.exe 5848 spoolsv.exe 5964 explorer.exe 6028 spoolsv.exe 6036 spoolsv.exe 1020 spoolsv.exe 5132 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 60 IoCs
Processes:
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 1880 set thread context of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 2256 set thread context of 636 2256 explorer.exe explorer.exe PID 1036 set thread context of 4764 1036 spoolsv.exe spoolsv.exe PID 2636 set thread context of 2972 2636 spoolsv.exe spoolsv.exe PID 4736 set thread context of 4116 4736 spoolsv.exe spoolsv.exe PID 4128 set thread context of 5436 4128 spoolsv.exe spoolsv.exe PID 3768 set thread context of 5500 3768 spoolsv.exe spoolsv.exe PID 2924 set thread context of 5596 2924 spoolsv.exe spoolsv.exe PID 3144 set thread context of 5676 3144 spoolsv.exe spoolsv.exe PID 2928 set thread context of 5788 2928 spoolsv.exe spoolsv.exe PID 3484 set thread context of 5848 3484 spoolsv.exe spoolsv.exe PID 3028 set thread context of 6028 3028 spoolsv.exe spoolsv.exe PID 3892 set thread context of 1020 3892 spoolsv.exe spoolsv.exe PID 2176 set thread context of 5132 2176 spoolsv.exe spoolsv.exe PID 2052 set thread context of 5260 2052 spoolsv.exe spoolsv.exe PID 2208 set thread context of 5272 2208 spoolsv.exe spoolsv.exe PID 3948 set thread context of 5316 3948 spoolsv.exe spoolsv.exe PID 4772 set thread context of 5212 4772 spoolsv.exe spoolsv.exe PID 436 set thread context of 5484 436 spoolsv.exe spoolsv.exe PID 2144 set thread context of 5496 2144 spoolsv.exe spoolsv.exe PID 2732 set thread context of 5564 2732 spoolsv.exe spoolsv.exe PID 4800 set thread context of 5516 4800 spoolsv.exe spoolsv.exe PID 1076 set thread context of 536 1076 spoolsv.exe spoolsv.exe PID 228 set thread context of 5644 228 spoolsv.exe spoolsv.exe PID 900 set thread context of 5736 900 spoolsv.exe spoolsv.exe PID 2524 set thread context of 344 2524 spoolsv.exe spoolsv.exe PID 4680 set thread context of 4384 4680 spoolsv.exe spoolsv.exe PID 1432 set thread context of 5812 1432 spoolsv.exe spoolsv.exe PID 1424 set thread context of 5804 1424 spoolsv.exe spoolsv.exe PID 2728 set thread context of 5948 2728 spoolsv.exe spoolsv.exe PID 4904 set thread context of 3492 4904 spoolsv.exe spoolsv.exe PID 916 set thread context of 4424 916 spoolsv.exe spoolsv.exe PID 1548 set thread context of 6108 1548 spoolsv.exe spoolsv.exe PID 2744 set thread context of 6068 2744 spoolsv.exe spoolsv.exe PID 3920 set thread context of 5048 3920 spoolsv.exe spoolsv.exe PID 392 set thread context of 1604 392 spoolsv.exe spoolsv.exe PID 1636 set thread context of 4628 1636 spoolsv.exe spoolsv.exe PID 3516 set thread context of 5228 3516 spoolsv.exe spoolsv.exe PID 3336 set thread context of 5304 3336 spoolsv.exe spoolsv.exe PID 2592 set thread context of 5348 2592 spoolsv.exe spoolsv.exe PID 4912 set thread context of 5328 4912 spoolsv.exe spoolsv.exe PID 4364 set thread context of 2192 4364 spoolsv.exe spoolsv.exe PID 4676 set thread context of 5116 4676 spoolsv.exe spoolsv.exe PID 3220 set thread context of 5532 3220 spoolsv.exe spoolsv.exe PID 4524 set thread context of 4632 4524 spoolsv.exe spoolsv.exe PID 3272 set thread context of 4980 3272 spoolsv.exe spoolsv.exe PID 3644 set thread context of 4320 3644 spoolsv.exe spoolsv.exe PID 2392 set thread context of 5732 2392 spoolsv.exe spoolsv.exe PID 2584 set thread context of 4360 2584 explorer.exe explorer.exe PID 5232 set thread context of 5524 5232 spoolsv.exe spoolsv.exe PID 6036 set thread context of 5980 6036 spoolsv.exe spoolsv.exe PID 5964 set thread context of 3280 5964 explorer.exe explorer.exe PID 5988 set thread context of 5816 5988 spoolsv.exe spoolsv.exe PID 704 set thread context of 400 704 explorer.exe explorer.exe PID 1836 set thread context of 5820 1836 spoolsv.exe spoolsv.exe PID 5244 set thread context of 1012 5244 spoolsv.exe spoolsv.exe PID 4596 set thread context of 4100 4596 spoolsv.exe spoolsv.exe PID 3156 set thread context of 5284 3156 spoolsv.exe spoolsv.exe PID 5404 set thread context of 4140 5404 spoolsv.exe spoolsv.exe PID 4668 set thread context of 4888 4668 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 64 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe04a64c3a6e62def229e162d97089512f_JaffaCakes118.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exeexplorer.exepid process 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 636 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 4764 spoolsv.exe 4764 spoolsv.exe 2972 spoolsv.exe 2972 spoolsv.exe 4116 spoolsv.exe 4116 spoolsv.exe 5436 spoolsv.exe 5436 spoolsv.exe 5500 spoolsv.exe 5500 spoolsv.exe 5596 spoolsv.exe 5596 spoolsv.exe 5676 spoolsv.exe 5676 spoolsv.exe 5788 spoolsv.exe 5788 spoolsv.exe 5848 spoolsv.exe 5848 spoolsv.exe 6028 spoolsv.exe 6028 spoolsv.exe 1020 spoolsv.exe 1020 spoolsv.exe 5132 spoolsv.exe 5132 spoolsv.exe 5260 spoolsv.exe 5260 spoolsv.exe 5272 spoolsv.exe 5272 spoolsv.exe 5316 spoolsv.exe 5316 spoolsv.exe 5212 spoolsv.exe 5212 spoolsv.exe 5496 spoolsv.exe 5496 spoolsv.exe 5516 spoolsv.exe 5516 spoolsv.exe 5564 spoolsv.exe 5564 spoolsv.exe 5484 spoolsv.exe 5484 spoolsv.exe 536 spoolsv.exe 536 spoolsv.exe 5644 spoolsv.exe 5644 spoolsv.exe 5736 spoolsv.exe 5736 spoolsv.exe 344 spoolsv.exe 344 spoolsv.exe 4384 spoolsv.exe 4384 spoolsv.exe 5812 spoolsv.exe 5812 spoolsv.exe 5804 spoolsv.exe 5804 spoolsv.exe 5948 spoolsv.exe 3492 spoolsv.exe 3492 spoolsv.exe 5948 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe04a64c3a6e62def229e162d97089512f_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 1880 wrote to memory of 776 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe splwow64.exe PID 1880 wrote to memory of 776 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe splwow64.exe PID 1880 wrote to memory of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 1880 wrote to memory of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 1880 wrote to memory of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 1880 wrote to memory of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 1880 wrote to memory of 2976 1880 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe PID 2976 wrote to memory of 2256 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe explorer.exe PID 2976 wrote to memory of 2256 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe explorer.exe PID 2976 wrote to memory of 2256 2976 04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe explorer.exe PID 2256 wrote to memory of 636 2256 explorer.exe explorer.exe PID 2256 wrote to memory of 636 2256 explorer.exe explorer.exe PID 2256 wrote to memory of 636 2256 explorer.exe explorer.exe PID 2256 wrote to memory of 636 2256 explorer.exe explorer.exe PID 2256 wrote to memory of 636 2256 explorer.exe explorer.exe PID 636 wrote to memory of 1036 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 1036 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 1036 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2636 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2636 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2636 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4736 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4736 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4736 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4128 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4128 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4128 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3768 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3768 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3768 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2924 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2924 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2924 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3144 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3144 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3144 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2928 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2928 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2928 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3484 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3484 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3484 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3028 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3028 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3028 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3892 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3892 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3892 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2176 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2176 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2176 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2052 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2052 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2052 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2208 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2208 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2208 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3948 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3948 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 3948 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4772 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4772 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 4772 636 explorer.exe spoolsv.exe PID 636 wrote to memory of 2144 636 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04a64c3a6e62def229e162d97089512f_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2584 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4360
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4736 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2924 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5596
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5848 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5964 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3280
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2176 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5260
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5212
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5496
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4800 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5516
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2732 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:900 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4680 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5804
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:392 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2744 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5228
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5304
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:704 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:400
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2192
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5116
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2392 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5524
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5192
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:6036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:5244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:3156 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4668 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4888
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1592
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5080
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5384
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5912
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5592
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1972
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6092
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2348
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2676
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD59427727a8df3024fbba0708aa9229745
SHA1f9abc20c55789b7d661ad087cb9cd872b408a79f
SHA25650f8cb7b338b630a0f65af6b0fa94f9cdba182a23af76fef670122a5fb3df597
SHA51250933ed673a7564e64604a0fbe1cdb2bae2ad41071c4fd2bf4e46da76572116e4f288d33f4f75bfb177e92a5c3cbe726fa5866c14370fa24afa4fa17c03e991a
-
Filesize
2.2MB
MD518ba03aee6e546f48b891b78495328bd
SHA1e5dedfdec4054dc78f65eb4cd08fc0f44500c35b
SHA256ff4c373ea6ed5289d86d9ea969f6c20aae9d693a8cbc7746dd7b49bdf01ca098
SHA512987d0d51973dfec0499ac3c693155eae8dc3a6b9c5edc07cde92c6fd5c8efeab0906fb581ccfa2da6f8ec062a8ad17641930e7eae5917437df58714a155a6189