Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 00:54
Behavioral task
behavioral1
Sample
0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
0675943ba90e4b700dfb095f1c7dee58
-
SHA1
8b865067cf5532d80edc3ab0be6c251d8ed13a66
-
SHA256
a37bcdef4f1338639d07f79229589e92cb98bbc5491b679803cb1c7664896297
-
SHA512
73058ac798a4c859788a13d576d2d93594ecfcb18dbc767d42488291e828e705a41715bd21e1650958c7dee4f3487b8ea4fded49ba610ad899bf773c2d906c5a
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZG:0UzeyQMS4DqodCnoe+iitjWwwa
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 1076 explorer.exe 1920 explorer.exe 3000 spoolsv.exe 1148 spoolsv.exe 2088 spoolsv.exe 4492 spoolsv.exe 880 spoolsv.exe 4364 spoolsv.exe 3700 spoolsv.exe 4900 spoolsv.exe 3532 spoolsv.exe 2512 spoolsv.exe 4316 spoolsv.exe 1236 spoolsv.exe 4188 spoolsv.exe 3480 spoolsv.exe 4792 spoolsv.exe 3600 spoolsv.exe 4716 spoolsv.exe 3620 spoolsv.exe 3588 spoolsv.exe 920 spoolsv.exe 3776 spoolsv.exe 2228 spoolsv.exe 3080 spoolsv.exe 4528 spoolsv.exe 4920 spoolsv.exe 1916 spoolsv.exe 1988 spoolsv.exe 5060 spoolsv.exe 2940 spoolsv.exe 424 spoolsv.exe 392 explorer.exe 4176 spoolsv.exe 3764 spoolsv.exe 4484 spoolsv.exe 3268 spoolsv.exe 3136 spoolsv.exe 2232 explorer.exe 3436 spoolsv.exe 3648 spoolsv.exe 3060 spoolsv.exe 4648 spoolsv.exe 4984 spoolsv.exe 1744 explorer.exe 2568 spoolsv.exe 4376 spoolsv.exe 3472 spoolsv.exe 2612 spoolsv.exe 4424 spoolsv.exe 3036 spoolsv.exe 3292 explorer.exe 4428 spoolsv.exe 1068 spoolsv.exe 2160 spoolsv.exe 4128 spoolsv.exe 3852 spoolsv.exe 4420 explorer.exe 1436 spoolsv.exe 2416 spoolsv.exe 1556 spoolsv.exe 3108 spoolsv.exe 2908 spoolsv.exe 816 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 54 IoCs
description pid Process procid_target PID 4876 set thread context of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 1076 set thread context of 1920 1076 explorer.exe 100 PID 3000 set thread context of 424 3000 spoolsv.exe 132 PID 1148 set thread context of 4176 1148 spoolsv.exe 134 PID 2088 set thread context of 4484 2088 spoolsv.exe 136 PID 4492 set thread context of 3268 4492 spoolsv.exe 137 PID 880 set thread context of 3136 880 spoolsv.exe 138 PID 4364 set thread context of 3436 4364 spoolsv.exe 140 PID 3700 set thread context of 3648 3700 spoolsv.exe 141 PID 4900 set thread context of 4648 4900 spoolsv.exe 143 PID 3532 set thread context of 4984 3532 spoolsv.exe 144 PID 2512 set thread context of 2568 2512 spoolsv.exe 146 PID 4316 set thread context of 4376 4316 spoolsv.exe 147 PID 1236 set thread context of 3472 1236 spoolsv.exe 148 PID 4188 set thread context of 2612 4188 spoolsv.exe 149 PID 3480 set thread context of 3036 3480 spoolsv.exe 151 PID 4792 set thread context of 4428 4792 spoolsv.exe 153 PID 3600 set thread context of 1068 3600 spoolsv.exe 154 PID 4716 set thread context of 2160 4716 spoolsv.exe 155 PID 3620 set thread context of 3852 3620 spoolsv.exe 157 PID 3588 set thread context of 1436 3588 spoolsv.exe 159 PID 920 set thread context of 2416 920 spoolsv.exe 160 PID 3776 set thread context of 1556 3776 spoolsv.exe 161 PID 2228 set thread context of 3108 2228 spoolsv.exe 162 PID 3080 set thread context of 816 3080 spoolsv.exe 164 PID 4528 set thread context of 4612 4528 spoolsv.exe 166 PID 4920 set thread context of 4320 4920 spoolsv.exe 167 PID 1916 set thread context of 1704 1916 spoolsv.exe 168 PID 1988 set thread context of 4300 1988 spoolsv.exe 170 PID 5060 set thread context of 3780 5060 spoolsv.exe 172 PID 2940 set thread context of 2212 2940 spoolsv.exe 175 PID 392 set thread context of 2816 392 explorer.exe 178 PID 3764 set thread context of 2120 3764 spoolsv.exe 182 PID 2232 set thread context of 4240 2232 explorer.exe 185 PID 3060 set thread context of 4052 3060 spoolsv.exe 189 PID 1744 set thread context of 4464 1744 explorer.exe 191 PID 4424 set thread context of 3208 4424 spoolsv.exe 195 PID 3292 set thread context of 4504 3292 explorer.exe 197 PID 4420 set thread context of 1692 4420 explorer.exe 201 PID 4128 set thread context of 452 4128 spoolsv.exe 202 PID 2908 set thread context of 364 2908 spoolsv.exe 207 PID 2276 set thread context of 2948 2276 explorer.exe 209 PID 4800 set thread context of 736 4800 spoolsv.exe 211 PID 2040 set thread context of 1996 2040 explorer.exe 213 PID 4520 set thread context of 2924 4520 spoolsv.exe 214 PID 5012 set thread context of 1656 5012 spoolsv.exe 215 PID 3044 set thread context of 1076 3044 explorer.exe 216 PID 1304 set thread context of 1012 1304 spoolsv.exe 218 PID 3460 set thread context of 2180 3460 spoolsv.exe 220 PID 1440 set thread context of 2400 1440 spoolsv.exe 221 PID 4332 set thread context of 1596 4332 spoolsv.exe 223 PID 4952 set thread context of 3784 4952 explorer.exe 225 PID 1240 set thread context of 2892 1240 spoolsv.exe 226 PID 956 set thread context of 2692 956 spoolsv.exe 227 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1920 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 424 spoolsv.exe 424 spoolsv.exe 4176 spoolsv.exe 4176 spoolsv.exe 4484 spoolsv.exe 4484 spoolsv.exe 3268 spoolsv.exe 3268 spoolsv.exe 3136 spoolsv.exe 3136 spoolsv.exe 3436 spoolsv.exe 3436 spoolsv.exe 3648 spoolsv.exe 3648 spoolsv.exe 4648 spoolsv.exe 4648 spoolsv.exe 4984 spoolsv.exe 4984 spoolsv.exe 2568 spoolsv.exe 2568 spoolsv.exe 4376 spoolsv.exe 4376 spoolsv.exe 3472 spoolsv.exe 3472 spoolsv.exe 2612 spoolsv.exe 2612 spoolsv.exe 3036 spoolsv.exe 3036 spoolsv.exe 4428 spoolsv.exe 4428 spoolsv.exe 1068 spoolsv.exe 1068 spoolsv.exe 2160 spoolsv.exe 2160 spoolsv.exe 3852 spoolsv.exe 3852 spoolsv.exe 1436 spoolsv.exe 1436 spoolsv.exe 2416 spoolsv.exe 2416 spoolsv.exe 1556 spoolsv.exe 1556 spoolsv.exe 3108 spoolsv.exe 3108 spoolsv.exe 816 spoolsv.exe 816 spoolsv.exe 4612 spoolsv.exe 4612 spoolsv.exe 4320 spoolsv.exe 4320 spoolsv.exe 1704 spoolsv.exe 1704 spoolsv.exe 4300 spoolsv.exe 4300 spoolsv.exe 3780 spoolsv.exe 3780 spoolsv.exe 2212 spoolsv.exe 2212 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4668 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 85 PID 4876 wrote to memory of 4668 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 85 PID 4876 wrote to memory of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 4876 wrote to memory of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 4876 wrote to memory of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 4876 wrote to memory of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 4876 wrote to memory of 2632 4876 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 91 PID 2632 wrote to memory of 1076 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 92 PID 2632 wrote to memory of 1076 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 92 PID 2632 wrote to memory of 1076 2632 0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe 92 PID 1076 wrote to memory of 1920 1076 explorer.exe 100 PID 1076 wrote to memory of 1920 1076 explorer.exe 100 PID 1076 wrote to memory of 1920 1076 explorer.exe 100 PID 1076 wrote to memory of 1920 1076 explorer.exe 100 PID 1076 wrote to memory of 1920 1076 explorer.exe 100 PID 1920 wrote to memory of 3000 1920 explorer.exe 101 PID 1920 wrote to memory of 3000 1920 explorer.exe 101 PID 1920 wrote to memory of 3000 1920 explorer.exe 101 PID 1920 wrote to memory of 1148 1920 explorer.exe 102 PID 1920 wrote to memory of 1148 1920 explorer.exe 102 PID 1920 wrote to memory of 1148 1920 explorer.exe 102 PID 1920 wrote to memory of 2088 1920 explorer.exe 103 PID 1920 wrote to memory of 2088 1920 explorer.exe 103 PID 1920 wrote to memory of 2088 1920 explorer.exe 103 PID 1920 wrote to memory of 4492 1920 explorer.exe 104 PID 1920 wrote to memory of 4492 1920 explorer.exe 104 PID 1920 wrote to memory of 4492 1920 explorer.exe 104 PID 1920 wrote to memory of 880 1920 explorer.exe 105 PID 1920 wrote to memory of 880 1920 explorer.exe 105 PID 1920 wrote to memory of 880 1920 explorer.exe 105 PID 1920 wrote to memory of 4364 1920 explorer.exe 106 PID 1920 wrote to memory of 4364 1920 explorer.exe 106 PID 1920 wrote to memory of 4364 1920 explorer.exe 106 PID 1920 wrote to memory of 3700 1920 explorer.exe 107 PID 1920 wrote to memory of 3700 1920 explorer.exe 107 PID 1920 wrote to memory of 3700 1920 explorer.exe 107 PID 1920 wrote to memory of 4900 1920 explorer.exe 108 PID 1920 wrote to memory of 4900 1920 explorer.exe 108 PID 1920 wrote to memory of 4900 1920 explorer.exe 108 PID 1920 wrote to memory of 3532 1920 explorer.exe 109 PID 1920 wrote to memory of 3532 1920 explorer.exe 109 PID 1920 wrote to memory of 3532 1920 explorer.exe 109 PID 1920 wrote to memory of 2512 1920 explorer.exe 110 PID 1920 wrote to memory of 2512 1920 explorer.exe 110 PID 1920 wrote to memory of 2512 1920 explorer.exe 110 PID 1920 wrote to memory of 4316 1920 explorer.exe 112 PID 1920 wrote to memory of 4316 1920 explorer.exe 112 PID 1920 wrote to memory of 4316 1920 explorer.exe 112 PID 1920 wrote to memory of 1236 1920 explorer.exe 114 PID 1920 wrote to memory of 1236 1920 explorer.exe 114 PID 1920 wrote to memory of 1236 1920 explorer.exe 114 PID 1920 wrote to memory of 4188 1920 explorer.exe 115 PID 1920 wrote to memory of 4188 1920 explorer.exe 115 PID 1920 wrote to memory of 4188 1920 explorer.exe 115 PID 1920 wrote to memory of 3480 1920 explorer.exe 116 PID 1920 wrote to memory of 3480 1920 explorer.exe 116 PID 1920 wrote to memory of 3480 1920 explorer.exe 116 PID 1920 wrote to memory of 4792 1920 explorer.exe 117 PID 1920 wrote to memory of 4792 1920 explorer.exe 117 PID 1920 wrote to memory of 4792 1920 explorer.exe 117 PID 1920 wrote to memory of 3600 1920 explorer.exe 118 PID 1920 wrote to memory of 3600 1920 explorer.exe 118 PID 1920 wrote to memory of 3600 1920 explorer.exe 118 PID 1920 wrote to memory of 4716 1920 explorer.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0675943ba90e4b700dfb095f1c7dee58_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:392 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2816
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1148 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3136 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2232 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4240
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4900 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4984 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1744 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4464
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3292 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4504
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4792 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4420 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1692
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2276 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2948
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4300 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2040 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1996
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3780
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2212 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:3044 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1076
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3764 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2120
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4952 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3784
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4052
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2428
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3208
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3240
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1560
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:364
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4288
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4800 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:736
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3624
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4520 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1012
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3788
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:4332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1596
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2652
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1240 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:512
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1292
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4348
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3484
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2164
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5088
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4936
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5ad2588e3c1017e2203b45f85f84f5142
SHA161490daa98f5bcd43a95a005ff34fda4df9d8cc6
SHA256dceda37f0b95b2d5886df2598166d357237f75869bb4047e4b408ca316b5bfd7
SHA5125a095725e81e79e5631eb6d6e928afe85d1addb39935cf094f739b5aa124fc31f57be11cda832229645cce0ce148bda9567ee1fc20738eb429d71156aa7b2f17
-
Filesize
2.2MB
MD500bdf32bbf690655e70b8357a18739a0
SHA15a6e45c3d904dbd72d370125346f99fe57108272
SHA256c3a96e0273dc5a498369f82cdcd94754bd997e645820653ca3e4d92692773852
SHA5122d765c2f2dc4fa1c70b993322ba3fe11d04a93c3d676ac1dfb091e9e9bec9b5850f13cc9680f2e9e73dcbdfa6babddab6529f7f2570eb9bf1b6e3c6de4878061