Analysis
-
max time kernel
116s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 10:46
Behavioral task
behavioral1
Sample
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
0504028d51adf14a3c753eca4901aab6
-
SHA1
43b7cd9aeb36509ede35dfd86f5380650178a5d4
-
SHA256
a76d734987394327655a1a3f22ef41ba248704328fb429de7910759cd60920a1
-
SHA512
472bf403ee9e0cbfece8ad6565900b7bf4f28e50159e95338cda9e6db81dad104f5914e6dc07ed91c5efe80228f0e6b25ba190ae7a538617a6b4abcb69d2e167
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZI:0UzeyQMS4DqodCnoe+iitjWww8
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe -
Executes dropped EXE 21 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exepid process 4060 explorer.exe 3084 explorer.exe 4936 spoolsv.exe 3552 spoolsv.exe 1488 spoolsv.exe 2980 spoolsv.exe 4404 spoolsv.exe 3476 spoolsv.exe 3064 spoolsv.exe 4432 spoolsv.exe 2592 spoolsv.exe 4024 spoolsv.exe 3340 spoolsv.exe 4252 spoolsv.exe 3940 spoolsv.exe 4376 explorer.exe 3292 spoolsv.exe 3044 spoolsv.exe 2068 explorer.exe 4304 spoolsv.exe 2376 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 3400 set thread context of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 4060 set thread context of 3084 4060 explorer.exe explorer.exe PID 4936 set thread context of 3940 4936 spoolsv.exe spoolsv.exe PID 3552 set thread context of 3044 3552 spoolsv.exe spoolsv.exe PID 1488 set thread context of 4304 1488 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 19 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exeexplorer.exe0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exeexplorer.exepid process 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exepid process 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3084 explorer.exe 3940 spoolsv.exe 3940 spoolsv.exe 3044 spoolsv.exe 3044 spoolsv.exe 4304 spoolsv.exe 4304 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 3400 wrote to memory of 2344 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe splwow64.exe PID 3400 wrote to memory of 2344 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe splwow64.exe PID 3400 wrote to memory of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 3400 wrote to memory of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 3400 wrote to memory of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 3400 wrote to memory of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 3400 wrote to memory of 4904 3400 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe PID 4904 wrote to memory of 4060 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe explorer.exe PID 4904 wrote to memory of 4060 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe explorer.exe PID 4904 wrote to memory of 4060 4904 0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe explorer.exe PID 4060 wrote to memory of 3084 4060 explorer.exe explorer.exe PID 4060 wrote to memory of 3084 4060 explorer.exe explorer.exe PID 4060 wrote to memory of 3084 4060 explorer.exe explorer.exe PID 4060 wrote to memory of 3084 4060 explorer.exe explorer.exe PID 4060 wrote to memory of 3084 4060 explorer.exe explorer.exe PID 3084 wrote to memory of 4936 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4936 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4936 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3552 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3552 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3552 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 1488 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 1488 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 1488 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2980 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2980 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2980 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4404 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4404 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4404 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3476 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3476 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3476 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3064 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3064 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3064 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4432 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4432 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4432 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2592 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2592 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 2592 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4024 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4024 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4024 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3340 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3340 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3340 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4252 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4252 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 4252 3084 explorer.exe spoolsv.exe PID 4936 wrote to memory of 3940 4936 spoolsv.exe spoolsv.exe PID 4936 wrote to memory of 3940 4936 spoolsv.exe spoolsv.exe PID 4936 wrote to memory of 3940 4936 spoolsv.exe spoolsv.exe PID 4936 wrote to memory of 3940 4936 spoolsv.exe spoolsv.exe PID 4936 wrote to memory of 3940 4936 spoolsv.exe spoolsv.exe PID 3940 wrote to memory of 4376 3940 spoolsv.exe explorer.exe PID 3940 wrote to memory of 4376 3940 spoolsv.exe explorer.exe PID 3940 wrote to memory of 4376 3940 spoolsv.exe explorer.exe PID 3084 wrote to memory of 3292 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3292 3084 explorer.exe spoolsv.exe PID 3084 wrote to memory of 3292 3084 explorer.exe spoolsv.exe PID 3552 wrote to memory of 3044 3552 spoolsv.exe spoolsv.exe PID 3552 wrote to memory of 3044 3552 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0504028d51adf14a3c753eca4901aab6_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4376 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3284
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2068 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2244
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1488 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2280
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1512
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2120
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1764
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2596
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1148
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2292
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2932
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4628
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2096
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1112
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4024 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2456
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3340 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5068
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3360
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4064
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4044
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2636
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3356
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3520
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2556
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1608
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4580
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2240
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2316
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3688
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1000
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1468
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4724
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1304
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4164
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:572
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5eb0ea5d67d799673773466cf57c0b125
SHA1ee06304574a7984c9e0c2d60d721561089c02b39
SHA2562f04192e42f89fb8d0a6fc30cc61c748da3a6cec94b29dc21ed28357da5cee17
SHA5125862dd3ec8ad8af5294b5470f1cc0d463065a22c91fea18c0b021682fab0222274cf5990f2baa2607195193804a20f188d1dd879de74167cd4dfa8188c85e22b
-
Filesize
2.2MB
MD54cd99013278b9551c105c5bd9b52b917
SHA117f734ffa5dbfae490a45d5c3712b6f8290c8477
SHA25676ec77c826b4e9f22144b892f9a9c7df3e29e171b8a17ecbb797cf886ed3f6dd
SHA512382f95aacf7f8d6fe0c93119c7eb247db32ab3ce2eabc19cafba87c4087248030ef6d0e5844a84bd85785d7508f4ffe36b8f7cb6c1a0be0bd74be92d1e7f3359