Analysis
-
max time kernel
149s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 19:35
Behavioral task
behavioral1
Sample
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
05eb3b2cd3c06c2e2d5e4d726bf55d28
-
SHA1
0d5cc2718d75d29d6ad5b00a8ee47a3ca68ce779
-
SHA256
6d22d9e47146de0f3df16ba82d087b0ea499dab337ad534226fd58a193c90d8b
-
SHA512
1a097cc8ff323304fc4589785a329b37ac0db7e5f420bb4f445c10c9592856ed1b6b4dfdd7d0f52e5ad45bca8181c99c5d85e7a22b9bfa74928cea2721c6acc9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZr:0UzeyQMS4DqodCnoe+iitjWww/
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exepid process 1928 explorer.exe 220 explorer.exe 4832 spoolsv.exe 1000 spoolsv.exe 4772 spoolsv.exe 956 spoolsv.exe 1980 spoolsv.exe 5052 spoolsv.exe 1560 spoolsv.exe 3168 spoolsv.exe 4576 spoolsv.exe 4428 spoolsv.exe 4128 spoolsv.exe 4080 spoolsv.exe 2444 spoolsv.exe 876 spoolsv.exe 4244 spoolsv.exe 1676 spoolsv.exe 2092 spoolsv.exe 3320 spoolsv.exe 3344 spoolsv.exe 4348 spoolsv.exe 2772 spoolsv.exe 4692 spoolsv.exe 2456 spoolsv.exe 4292 spoolsv.exe 4592 spoolsv.exe 332 spoolsv.exe 1568 spoolsv.exe 4948 spoolsv.exe 516 spoolsv.exe 2984 spoolsv.exe 940 spoolsv.exe 4324 explorer.exe 4644 spoolsv.exe 4836 spoolsv.exe 2924 spoolsv.exe 2292 spoolsv.exe 3656 spoolsv.exe 4536 spoolsv.exe 2932 spoolsv.exe 3212 explorer.exe 4420 spoolsv.exe 2540 spoolsv.exe 2792 spoolsv.exe 3620 spoolsv.exe 1608 spoolsv.exe 4660 spoolsv.exe 3708 explorer.exe 2888 spoolsv.exe 3352 spoolsv.exe 4300 spoolsv.exe 4912 spoolsv.exe 4404 spoolsv.exe 4264 explorer.exe 4448 spoolsv.exe 4464 spoolsv.exe 2372 spoolsv.exe 2992 spoolsv.exe 3176 spoolsv.exe 3108 spoolsv.exe 1052 explorer.exe 2312 spoolsv.exe 4444 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 54 IoCs
Processes:
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exedescription pid process target process PID 4400 set thread context of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 1928 set thread context of 220 1928 explorer.exe explorer.exe PID 4832 set thread context of 940 4832 spoolsv.exe spoolsv.exe PID 1000 set thread context of 4644 1000 spoolsv.exe spoolsv.exe PID 4772 set thread context of 4836 4772 spoolsv.exe spoolsv.exe PID 956 set thread context of 2924 956 spoolsv.exe spoolsv.exe PID 1980 set thread context of 2292 1980 spoolsv.exe spoolsv.exe PID 5052 set thread context of 3656 5052 spoolsv.exe spoolsv.exe PID 1560 set thread context of 2932 1560 spoolsv.exe spoolsv.exe PID 3168 set thread context of 4420 3168 spoolsv.exe spoolsv.exe PID 4576 set thread context of 2540 4576 spoolsv.exe spoolsv.exe PID 4428 set thread context of 2792 4428 spoolsv.exe spoolsv.exe PID 4128 set thread context of 1608 4128 spoolsv.exe spoolsv.exe PID 4080 set thread context of 4660 4080 spoolsv.exe spoolsv.exe PID 2444 set thread context of 2888 2444 spoolsv.exe spoolsv.exe PID 876 set thread context of 4300 876 spoolsv.exe spoolsv.exe PID 4244 set thread context of 4912 4244 spoolsv.exe spoolsv.exe PID 1676 set thread context of 4404 1676 spoolsv.exe spoolsv.exe PID 2092 set thread context of 4448 2092 spoolsv.exe spoolsv.exe PID 3320 set thread context of 4464 3320 spoolsv.exe spoolsv.exe PID 3344 set thread context of 2992 3344 spoolsv.exe spoolsv.exe PID 4348 set thread context of 3176 4348 spoolsv.exe spoolsv.exe PID 2772 set thread context of 3108 2772 spoolsv.exe spoolsv.exe PID 4692 set thread context of 2312 4692 spoolsv.exe spoolsv.exe PID 2456 set thread context of 5024 2456 spoolsv.exe spoolsv.exe PID 4292 set thread context of 2436 4292 spoolsv.exe spoolsv.exe PID 4592 set thread context of 1928 4592 spoolsv.exe spoolsv.exe PID 332 set thread context of 4412 332 spoolsv.exe spoolsv.exe PID 1568 set thread context of 2940 1568 spoolsv.exe spoolsv.exe PID 4948 set thread context of 4392 4948 spoolsv.exe spoolsv.exe PID 516 set thread context of 3812 516 spoolsv.exe spoolsv.exe PID 2984 set thread context of 2576 2984 spoolsv.exe spoolsv.exe PID 4324 set thread context of 4848 4324 explorer.exe explorer.exe PID 4536 set thread context of 3892 4536 spoolsv.exe spoolsv.exe PID 3212 set thread context of 1632 3212 explorer.exe explorer.exe PID 3620 set thread context of 2468 3620 spoolsv.exe spoolsv.exe PID 3708 set thread context of 2940 3708 explorer.exe explorer.exe PID 3352 set thread context of 1604 3352 spoolsv.exe spoolsv.exe PID 4264 set thread context of 628 4264 explorer.exe explorer.exe PID 2372 set thread context of 4472 2372 spoolsv.exe spoolsv.exe PID 1052 set thread context of 2296 1052 explorer.exe explorer.exe PID 4444 set thread context of 4996 4444 spoolsv.exe spoolsv.exe PID 4560 set thread context of 4788 4560 spoolsv.exe spoolsv.exe PID 3308 set thread context of 3612 3308 explorer.exe explorer.exe PID 100 set thread context of 3208 100 spoolsv.exe spoolsv.exe PID 3896 set thread context of 1660 3896 spoolsv.exe spoolsv.exe PID 3064 set thread context of 1556 3064 spoolsv.exe spoolsv.exe PID 1680 set thread context of 4628 1680 spoolsv.exe spoolsv.exe PID 1936 set thread context of 1176 1936 explorer.exe explorer.exe PID 4588 set thread context of 4648 4588 spoolsv.exe spoolsv.exe PID 3976 set thread context of 812 3976 spoolsv.exe spoolsv.exe PID 536 set thread context of 2852 536 explorer.exe explorer.exe PID 4180 set thread context of 4888 4180 spoolsv.exe spoolsv.exe PID 3008 set thread context of 3084 3008 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 64 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exeexplorer.exepid process 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 220 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 940 spoolsv.exe 940 spoolsv.exe 4644 spoolsv.exe 4644 spoolsv.exe 4836 spoolsv.exe 4836 spoolsv.exe 2924 spoolsv.exe 2924 spoolsv.exe 2292 spoolsv.exe 2292 spoolsv.exe 3656 spoolsv.exe 3656 spoolsv.exe 2932 spoolsv.exe 2932 spoolsv.exe 4420 spoolsv.exe 4420 spoolsv.exe 2540 spoolsv.exe 2540 spoolsv.exe 2792 spoolsv.exe 2792 spoolsv.exe 1608 spoolsv.exe 1608 spoolsv.exe 4660 spoolsv.exe 4660 spoolsv.exe 2888 spoolsv.exe 2888 spoolsv.exe 4300 spoolsv.exe 4300 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 4404 spoolsv.exe 4404 spoolsv.exe 4448 spoolsv.exe 4448 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 2992 spoolsv.exe 2992 spoolsv.exe 3176 spoolsv.exe 3176 spoolsv.exe 3108 spoolsv.exe 3108 spoolsv.exe 2312 spoolsv.exe 2312 spoolsv.exe 5024 spoolsv.exe 5024 spoolsv.exe 2436 spoolsv.exe 2436 spoolsv.exe 1928 spoolsv.exe 1928 spoolsv.exe 4412 spoolsv.exe 4412 spoolsv.exe 2940 spoolsv.exe 2940 spoolsv.exe 4392 spoolsv.exe 4392 spoolsv.exe 3812 spoolsv.exe 3812 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 4400 wrote to memory of 2000 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe splwow64.exe PID 4400 wrote to memory of 2000 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe splwow64.exe PID 4400 wrote to memory of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 4400 wrote to memory of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 4400 wrote to memory of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 4400 wrote to memory of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 4400 wrote to memory of 4680 4400 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe PID 4680 wrote to memory of 1928 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe explorer.exe PID 4680 wrote to memory of 1928 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe explorer.exe PID 4680 wrote to memory of 1928 4680 05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe explorer.exe PID 1928 wrote to memory of 220 1928 explorer.exe explorer.exe PID 1928 wrote to memory of 220 1928 explorer.exe explorer.exe PID 1928 wrote to memory of 220 1928 explorer.exe explorer.exe PID 1928 wrote to memory of 220 1928 explorer.exe explorer.exe PID 1928 wrote to memory of 220 1928 explorer.exe explorer.exe PID 220 wrote to memory of 4832 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4832 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4832 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1000 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1000 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1000 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4772 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4772 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4772 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 956 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 956 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 956 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1980 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1980 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1980 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 5052 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 5052 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 5052 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1560 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1560 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1560 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 3168 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 3168 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 3168 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4576 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4576 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4576 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4428 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4428 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4428 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4128 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4128 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4128 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4080 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4080 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4080 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 2444 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 2444 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 2444 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 876 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 876 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 876 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4244 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4244 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 4244 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1676 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1676 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 1676 220 explorer.exe spoolsv.exe PID 220 wrote to memory of 2092 220 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05eb3b2cd3c06c2e2d5e4d726bf55d28_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4324 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4848
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3212 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1632
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3708 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2940
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4404 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4264 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:628
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3320 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3108 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1052 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2296
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4412 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3308 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3612
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1568 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4392
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2576
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1936 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1176
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3892
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:536 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2852
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2468
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:840
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1604
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4160
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4472
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:400
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4996
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4188
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4788
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1252
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:3896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1556
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3268
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:1680 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4628
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4296
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:3976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4888
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4376
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:3008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3640
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3404
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2168
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1992
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4008
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2300
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3556
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4152
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1764
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2928
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4476
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD51bdcef0a774ce5e4c791dd4c947cd613
SHA1a6b73ef8c33d0faf0642d1d462af91aeb939b724
SHA2562197e6bebbe46d74b94be08db39770bf62d46650a68c3346856c816aa9b4b3a9
SHA512c65ff99b5f2eec0a9be57fc045c78d0d7f9721852bc3c4dfb0147d7f0cf8c2a7089232ae0bf85b29d189612d0a439d5a7220525e831641d34992c114b1ed2bb7
-
Filesize
2.2MB
MD5922080ed606f163e4d402231632f80bf
SHA1e76991e32b7b89d27ff08098e0875a106d11d034
SHA256ccdb57d9323277b7be42b6c17a3f0bf4252b04b885d560780641b85081a73500
SHA51294a5c7f2878eeb3f17a0a93d30c45fe865684868289a40e46797999715159e41dfabbd3a19be2702ab37fa2eb5af5bb8e9b8cea5aac9f31f5725efcdf91d92db