Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:54
Behavioral task
behavioral1
Sample
049df55017863aee75658f71a846933d_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
049df55017863aee75658f71a846933d_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
049df55017863aee75658f71a846933d
-
SHA1
9cc4da05ab03281335d21392aa09a2489d3cd7a3
-
SHA256
3c436959a3b9fe1684586ea92899aec739df3835217c3216cd85ad6256b08767
-
SHA512
6aed3828bd64dbe4bf9990a26c77282b0b1593a68b77b66f0f53c78a2ee9181122838dd1a7ecd491903efb6de38e1c5529143b0e586e1711a590df525aa613e9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZn:0UzeyQMS4DqodCnoe+iitjWwwj
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
049df55017863aee75658f71a846933d_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exepid process 3312 explorer.exe 2648 explorer.exe 2228 spoolsv.exe 1740 spoolsv.exe 864 spoolsv.exe 3052 spoolsv.exe 3216 spoolsv.exe 4576 spoolsv.exe 2920 spoolsv.exe 3784 spoolsv.exe 2008 spoolsv.exe 4816 spoolsv.exe 3176 spoolsv.exe 4348 spoolsv.exe 1384 spoolsv.exe 400 spoolsv.exe 4112 spoolsv.exe 3000 spoolsv.exe 3896 spoolsv.exe 1540 spoolsv.exe 624 spoolsv.exe 928 spoolsv.exe 3112 spoolsv.exe 1752 spoolsv.exe 1440 spoolsv.exe 3972 spoolsv.exe 4672 spoolsv.exe 1592 spoolsv.exe 2400 spoolsv.exe 432 spoolsv.exe 4320 spoolsv.exe 2044 spoolsv.exe 1092 spoolsv.exe 2744 explorer.exe 3760 spoolsv.exe 4292 spoolsv.exe 4040 spoolsv.exe 428 spoolsv.exe 2024 spoolsv.exe 3376 explorer.exe 4084 spoolsv.exe 3268 spoolsv.exe 716 spoolsv.exe 4016 spoolsv.exe 3324 spoolsv.exe 2952 explorer.exe 2052 spoolsv.exe 1204 spoolsv.exe 1672 spoolsv.exe 2380 spoolsv.exe 2432 spoolsv.exe 4736 explorer.exe 408 spoolsv.exe 1376 spoolsv.exe 2992 spoolsv.exe 1840 spoolsv.exe 4288 spoolsv.exe 4012 explorer.exe 448 spoolsv.exe 4628 spoolsv.exe 668 spoolsv.exe 1108 spoolsv.exe 4060 spoolsv.exe 2508 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 56 IoCs
Processes:
049df55017863aee75658f71a846933d_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 116 set thread context of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 3312 set thread context of 2648 3312 explorer.exe explorer.exe PID 2228 set thread context of 1092 2228 spoolsv.exe spoolsv.exe PID 1740 set thread context of 3760 1740 spoolsv.exe spoolsv.exe PID 864 set thread context of 4292 864 spoolsv.exe spoolsv.exe PID 3052 set thread context of 4040 3052 spoolsv.exe spoolsv.exe PID 3216 set thread context of 2024 3216 spoolsv.exe spoolsv.exe PID 4576 set thread context of 4084 4576 spoolsv.exe spoolsv.exe PID 2920 set thread context of 3268 2920 spoolsv.exe spoolsv.exe PID 3784 set thread context of 716 3784 spoolsv.exe spoolsv.exe PID 2008 set thread context of 3324 2008 spoolsv.exe spoolsv.exe PID 4816 set thread context of 2052 4816 spoolsv.exe spoolsv.exe PID 3176 set thread context of 1204 3176 spoolsv.exe spoolsv.exe PID 4348 set thread context of 1672 4348 spoolsv.exe spoolsv.exe PID 1384 set thread context of 2432 1384 spoolsv.exe spoolsv.exe PID 400 set thread context of 408 400 spoolsv.exe spoolsv.exe PID 4112 set thread context of 1376 4112 spoolsv.exe spoolsv.exe PID 3000 set thread context of 2992 3000 spoolsv.exe spoolsv.exe PID 3896 set thread context of 4288 3896 spoolsv.exe spoolsv.exe PID 1540 set thread context of 448 1540 spoolsv.exe spoolsv.exe PID 624 set thread context of 4628 624 spoolsv.exe spoolsv.exe PID 928 set thread context of 1108 928 spoolsv.exe spoolsv.exe PID 3112 set thread context of 4060 3112 spoolsv.exe spoolsv.exe PID 1752 set thread context of 3552 1752 spoolsv.exe spoolsv.exe PID 1440 set thread context of 3536 1440 spoolsv.exe spoolsv.exe PID 3972 set thread context of 3948 3972 spoolsv.exe spoolsv.exe PID 4672 set thread context of 4864 4672 spoolsv.exe spoolsv.exe PID 1592 set thread context of 1764 1592 spoolsv.exe spoolsv.exe PID 2400 set thread context of 4788 2400 spoolsv.exe spoolsv.exe PID 432 set thread context of 2012 432 spoolsv.exe spoolsv.exe PID 4320 set thread context of 4992 4320 spoolsv.exe spoolsv.exe PID 2044 set thread context of 1436 2044 spoolsv.exe spoolsv.exe PID 2744 set thread context of 2956 2744 explorer.exe explorer.exe PID 428 set thread context of 724 428 spoolsv.exe spoolsv.exe PID 3376 set thread context of 3260 3376 explorer.exe explorer.exe PID 4016 set thread context of 996 4016 spoolsv.exe spoolsv.exe PID 2952 set thread context of 3516 2952 explorer.exe explorer.exe PID 4736 set thread context of 3252 4736 explorer.exe explorer.exe PID 2380 set thread context of 1512 2380 spoolsv.exe spoolsv.exe PID 1840 set thread context of 1932 1840 spoolsv.exe spoolsv.exe PID 4012 set thread context of 1060 4012 explorer.exe explorer.exe PID 668 set thread context of 468 668 spoolsv.exe spoolsv.exe PID 2508 set thread context of 1756 2508 explorer.exe explorer.exe PID 2804 set thread context of 2428 2804 spoolsv.exe spoolsv.exe PID 1760 set thread context of 3152 1760 explorer.exe explorer.exe PID 2660 set thread context of 516 2660 spoolsv.exe spoolsv.exe PID 2276 set thread context of 4544 2276 explorer.exe explorer.exe PID 2032 set thread context of 3952 2032 spoolsv.exe spoolsv.exe PID 3696 set thread context of 4956 3696 spoolsv.exe spoolsv.exe PID 3644 set thread context of 3304 3644 explorer.exe explorer.exe PID 4676 set thread context of 3284 4676 spoolsv.exe spoolsv.exe PID 64 set thread context of 2588 64 spoolsv.exe spoolsv.exe PID 396 set thread context of 4552 396 explorer.exe explorer.exe PID 4996 set thread context of 2464 4996 spoolsv.exe spoolsv.exe PID 2116 set thread context of 3248 2116 spoolsv.exe spoolsv.exe PID 2880 set thread context of 4584 2880 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 64 IoCs
Processes:
spoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exe049df55017863aee75658f71a846933d_JaffaCakes118.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 049df55017863aee75658f71a846933d_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
049df55017863aee75658f71a846933d_JaffaCakes118.exeexplorer.exepid process 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2648 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
049df55017863aee75658f71a846933d_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 2648 explorer.exe 1092 spoolsv.exe 1092 spoolsv.exe 3760 spoolsv.exe 3760 spoolsv.exe 4292 spoolsv.exe 4292 spoolsv.exe 4040 spoolsv.exe 4040 spoolsv.exe 2024 spoolsv.exe 2024 spoolsv.exe 4084 spoolsv.exe 4084 spoolsv.exe 3268 spoolsv.exe 3268 spoolsv.exe 716 spoolsv.exe 716 spoolsv.exe 3324 spoolsv.exe 3324 spoolsv.exe 2052 spoolsv.exe 2052 spoolsv.exe 1204 spoolsv.exe 1204 spoolsv.exe 1672 spoolsv.exe 1672 spoolsv.exe 2432 spoolsv.exe 2432 spoolsv.exe 408 spoolsv.exe 408 spoolsv.exe 1376 spoolsv.exe 1376 spoolsv.exe 2992 spoolsv.exe 2992 spoolsv.exe 4288 spoolsv.exe 4288 spoolsv.exe 448 spoolsv.exe 448 spoolsv.exe 4628 spoolsv.exe 4628 spoolsv.exe 1108 spoolsv.exe 1108 spoolsv.exe 4060 spoolsv.exe 4060 spoolsv.exe 3552 spoolsv.exe 3552 spoolsv.exe 3536 spoolsv.exe 3536 spoolsv.exe 3948 spoolsv.exe 3948 spoolsv.exe 4864 spoolsv.exe 4864 spoolsv.exe 1764 spoolsv.exe 1764 spoolsv.exe 4788 spoolsv.exe 4788 spoolsv.exe 2012 spoolsv.exe 2012 spoolsv.exe 4992 spoolsv.exe 4992 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
049df55017863aee75658f71a846933d_JaffaCakes118.exe049df55017863aee75658f71a846933d_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 116 wrote to memory of 5004 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe splwow64.exe PID 116 wrote to memory of 5004 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe splwow64.exe PID 116 wrote to memory of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 116 wrote to memory of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 116 wrote to memory of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 116 wrote to memory of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 116 wrote to memory of 2272 116 049df55017863aee75658f71a846933d_JaffaCakes118.exe 049df55017863aee75658f71a846933d_JaffaCakes118.exe PID 2272 wrote to memory of 3312 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe explorer.exe PID 2272 wrote to memory of 3312 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe explorer.exe PID 2272 wrote to memory of 3312 2272 049df55017863aee75658f71a846933d_JaffaCakes118.exe explorer.exe PID 3312 wrote to memory of 2648 3312 explorer.exe explorer.exe PID 3312 wrote to memory of 2648 3312 explorer.exe explorer.exe PID 3312 wrote to memory of 2648 3312 explorer.exe explorer.exe PID 3312 wrote to memory of 2648 3312 explorer.exe explorer.exe PID 3312 wrote to memory of 2648 3312 explorer.exe explorer.exe PID 2648 wrote to memory of 2228 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2228 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2228 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1740 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1740 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1740 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 864 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 864 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 864 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3052 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3052 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3052 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3216 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3216 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3216 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4576 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4576 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4576 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2920 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2920 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2920 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3784 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3784 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3784 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2008 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2008 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 2008 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4816 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4816 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4816 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3176 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3176 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3176 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4348 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4348 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4348 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1384 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1384 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 1384 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 400 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 400 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 400 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4112 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4112 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 4112 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3000 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3000 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3000 2648 explorer.exe spoolsv.exe PID 2648 wrote to memory of 3896 2648 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\049df55017863aee75658f71a846933d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\049df55017863aee75658f71a846933d_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\049df55017863aee75658f71a846933d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\049df55017863aee75658f71a846933d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2744 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2956
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1740 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:864 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4292
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3376 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3260
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3784 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3324 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2952 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3516
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3176 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4736 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3252
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4012 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1060
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2508 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1756
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1760 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3152
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4320 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4992 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:2276 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4544
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1436
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:3644 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3304
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:724
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:396 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4552
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:996
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2212 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2192
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4424
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1932
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3876
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:668 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:468
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5012
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2428
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:440
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:516
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3696 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4956
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3764
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:64 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2464
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4660
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3248
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4584
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5024
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2736
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1012
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4044
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4872
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2840
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4412
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4008
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5dc202b76b1772ef14953df0852f03295
SHA13fb7201b40f20c760834778797f3b3893b345c7b
SHA256e2031121bd91eec55031c17c3551a9e57bc369fc2db3935c94d2dadd45b25706
SHA512478a8e4761e586813e1fe174222e1c75a45f2b0718767a445270e1e7373dd0e731a888763b5cdb0ba5837b2a06ba732e0f27cc05d86a160668df776f964999a5
-
Filesize
2.2MB
MD511ec23fc21267a321ad53e0eab17fa1c
SHA10484d8cdf8404b3cf26b6b9d75e6a422d7f325bc
SHA2566e592e1d0de5035e84ad3d50f7c668c29fa3822b42bb489a17454f1433fa47af
SHA512df8f72135c79ac686b9a52e8013425e2d449586995db059305516864a9a951c5de41cecac7e3007e69756947a22bba04576b91d68ac9195e4793af495f97bce6