Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 21:20
Behavioral task
behavioral1
Sample
1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
1487dd2c2fae2b2576393a80c5af60b0
-
SHA1
62d35322fbece8ddf3c349fcf6494a0e2c84a0f0
-
SHA256
d38b1278823755b3af29a39eb993bca925898e8bf3e8cccafe2c92e4d08100da
-
SHA512
9763e3bd56ee042053664d6d90ccfde7aa8ec11575eb76afc98a0581f29c531e40caa68ceb249aaba228a06c6b8e8c5424b75c2fea9a6836ba4dfc5f8c8e40e7
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ1:0UzeyQMS4DqodCnoe+iitjWwwZ
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2464 explorer.exe 3680 explorer.exe 2820 spoolsv.exe 2024 spoolsv.exe 1104 spoolsv.exe 5032 spoolsv.exe 4860 spoolsv.exe 4552 spoolsv.exe 368 spoolsv.exe 4928 spoolsv.exe 4712 spoolsv.exe 484 spoolsv.exe 632 spoolsv.exe 3848 spoolsv.exe 1964 spoolsv.exe 952 spoolsv.exe 3692 spoolsv.exe 1700 spoolsv.exe 1028 spoolsv.exe 4008 spoolsv.exe 5096 spoolsv.exe 3548 spoolsv.exe 4720 spoolsv.exe 3924 spoolsv.exe 424 spoolsv.exe 5108 spoolsv.exe 4016 spoolsv.exe 2864 spoolsv.exe 552 spoolsv.exe 2716 spoolsv.exe 2152 spoolsv.exe 2764 explorer.exe 4176 spoolsv.exe 2360 spoolsv.exe 4604 spoolsv.exe 1352 spoolsv.exe 652 spoolsv.exe 4140 explorer.exe 3952 spoolsv.exe 4368 spoolsv.exe 4748 spoolsv.exe 2000 spoolsv.exe 4660 spoolsv.exe 4524 explorer.exe 3452 spoolsv.exe 4856 spoolsv.exe 1368 spoolsv.exe 2044 spoolsv.exe 4932 spoolsv.exe 1548 explorer.exe 3508 spoolsv.exe 3560 spoolsv.exe 3996 spoolsv.exe 2136 spoolsv.exe 3288 explorer.exe 3556 spoolsv.exe 876 spoolsv.exe 1500 spoolsv.exe 3932 spoolsv.exe 2284 spoolsv.exe 2944 explorer.exe 1052 spoolsv.exe 4384 spoolsv.exe 2928 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 32 IoCs
description pid Process procid_target PID 4988 set thread context of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 2464 set thread context of 3680 2464 explorer.exe 103 PID 2820 set thread context of 2152 2820 spoolsv.exe 137 PID 2024 set thread context of 4176 2024 spoolsv.exe 139 PID 1104 set thread context of 2360 1104 spoolsv.exe 140 PID 5032 set thread context of 4604 5032 spoolsv.exe 141 PID 4860 set thread context of 652 4860 spoolsv.exe 143 PID 4552 set thread context of 3952 4552 spoolsv.exe 145 PID 368 set thread context of 4368 368 spoolsv.exe 146 PID 4928 set thread context of 4748 4928 spoolsv.exe 147 PID 4712 set thread context of 4660 4712 spoolsv.exe 149 PID 484 set thread context of 3452 484 spoolsv.exe 151 PID 632 set thread context of 4856 632 spoolsv.exe 152 PID 3848 set thread context of 1368 3848 spoolsv.exe 153 PID 1964 set thread context of 4932 1964 spoolsv.exe 155 PID 952 set thread context of 3560 952 spoolsv.exe 158 PID 3692 set thread context of 2136 3692 spoolsv.exe 161 PID 1700 set thread context of 3556 1700 spoolsv.exe 163 PID 1028 set thread context of 876 1028 spoolsv.exe 164 PID 4008 set thread context of 3932 4008 spoolsv.exe 166 PID 5096 set thread context of 2284 5096 spoolsv.exe 167 PID 3548 set thread context of 1052 3548 spoolsv.exe 169 PID 4720 set thread context of 2928 4720 spoolsv.exe 171 PID 3924 set thread context of 1356 3924 spoolsv.exe 172 PID 424 set thread context of 3124 424 spoolsv.exe 175 PID 5108 set thread context of 768 5108 spoolsv.exe 176 PID 4016 set thread context of 2972 4016 spoolsv.exe 202 PID 2864 set thread context of 2980 2864 spoolsv.exe 179 PID 552 set thread context of 2676 552 spoolsv.exe 181 PID 2716 set thread context of 3188 2716 spoolsv.exe 188 PID 2764 set thread context of 4468 2764 explorer.exe 190 PID 1352 set thread context of 3988 1352 spoolsv.exe 199 -
Drops file in Windows directory 58 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 3680 explorer.exe 2152 spoolsv.exe 2152 spoolsv.exe 4176 spoolsv.exe 4176 spoolsv.exe 2360 spoolsv.exe 2360 spoolsv.exe 4604 spoolsv.exe 4604 spoolsv.exe 652 spoolsv.exe 652 spoolsv.exe 3952 spoolsv.exe 3952 spoolsv.exe 4368 spoolsv.exe 4368 spoolsv.exe 4748 spoolsv.exe 4748 spoolsv.exe 4660 spoolsv.exe 4660 spoolsv.exe 3452 spoolsv.exe 3452 spoolsv.exe 4856 spoolsv.exe 4856 spoolsv.exe 1368 spoolsv.exe 1368 spoolsv.exe 4932 spoolsv.exe 4932 spoolsv.exe 3560 spoolsv.exe 3560 spoolsv.exe 2136 spoolsv.exe 2136 spoolsv.exe 3556 spoolsv.exe 3556 spoolsv.exe 876 spoolsv.exe 876 spoolsv.exe 3932 spoolsv.exe 3932 spoolsv.exe 2284 spoolsv.exe 2284 spoolsv.exe 1052 spoolsv.exe 1052 spoolsv.exe 2928 spoolsv.exe 2928 spoolsv.exe 1356 spoolsv.exe 1356 spoolsv.exe 3124 spoolsv.exe 3124 spoolsv.exe 768 spoolsv.exe 768 spoolsv.exe 2972 spoolsv.exe 2972 spoolsv.exe 2980 spoolsv.exe 2980 spoolsv.exe 2676 spoolsv.exe 2676 spoolsv.exe 3188 spoolsv.exe 3188 spoolsv.exe 4468 explorer.exe 4468 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4304 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 84 PID 4988 wrote to memory of 4304 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 84 PID 4988 wrote to memory of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 4988 wrote to memory of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 4988 wrote to memory of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 4988 wrote to memory of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 4988 wrote to memory of 3664 4988 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 99 PID 3664 wrote to memory of 2464 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 100 PID 3664 wrote to memory of 2464 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 100 PID 3664 wrote to memory of 2464 3664 1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe 100 PID 2464 wrote to memory of 3680 2464 explorer.exe 103 PID 2464 wrote to memory of 3680 2464 explorer.exe 103 PID 2464 wrote to memory of 3680 2464 explorer.exe 103 PID 2464 wrote to memory of 3680 2464 explorer.exe 103 PID 2464 wrote to memory of 3680 2464 explorer.exe 103 PID 3680 wrote to memory of 2820 3680 explorer.exe 104 PID 3680 wrote to memory of 2820 3680 explorer.exe 104 PID 3680 wrote to memory of 2820 3680 explorer.exe 104 PID 3680 wrote to memory of 2024 3680 explorer.exe 105 PID 3680 wrote to memory of 2024 3680 explorer.exe 105 PID 3680 wrote to memory of 2024 3680 explorer.exe 105 PID 3680 wrote to memory of 1104 3680 explorer.exe 106 PID 3680 wrote to memory of 1104 3680 explorer.exe 106 PID 3680 wrote to memory of 1104 3680 explorer.exe 106 PID 3680 wrote to memory of 5032 3680 explorer.exe 107 PID 3680 wrote to memory of 5032 3680 explorer.exe 107 PID 3680 wrote to memory of 5032 3680 explorer.exe 107 PID 3680 wrote to memory of 4860 3680 explorer.exe 108 PID 3680 wrote to memory of 4860 3680 explorer.exe 108 PID 3680 wrote to memory of 4860 3680 explorer.exe 108 PID 3680 wrote to memory of 4552 3680 explorer.exe 109 PID 3680 wrote to memory of 4552 3680 explorer.exe 109 PID 3680 wrote to memory of 4552 3680 explorer.exe 109 PID 3680 wrote to memory of 368 3680 explorer.exe 110 PID 3680 wrote to memory of 368 3680 explorer.exe 110 PID 3680 wrote to memory of 368 3680 explorer.exe 110 PID 3680 wrote to memory of 4928 3680 explorer.exe 111 PID 3680 wrote to memory of 4928 3680 explorer.exe 111 PID 3680 wrote to memory of 4928 3680 explorer.exe 111 PID 3680 wrote to memory of 4712 3680 explorer.exe 113 PID 3680 wrote to memory of 4712 3680 explorer.exe 113 PID 3680 wrote to memory of 4712 3680 explorer.exe 113 PID 3680 wrote to memory of 484 3680 explorer.exe 114 PID 3680 wrote to memory of 484 3680 explorer.exe 114 PID 3680 wrote to memory of 484 3680 explorer.exe 114 PID 3680 wrote to memory of 632 3680 explorer.exe 116 PID 3680 wrote to memory of 632 3680 explorer.exe 116 PID 3680 wrote to memory of 632 3680 explorer.exe 116 PID 3680 wrote to memory of 3848 3680 explorer.exe 120 PID 3680 wrote to memory of 3848 3680 explorer.exe 120 PID 3680 wrote to memory of 3848 3680 explorer.exe 120 PID 3680 wrote to memory of 1964 3680 explorer.exe 121 PID 3680 wrote to memory of 1964 3680 explorer.exe 121 PID 3680 wrote to memory of 1964 3680 explorer.exe 121 PID 3680 wrote to memory of 952 3680 explorer.exe 122 PID 3680 wrote to memory of 952 3680 explorer.exe 122 PID 3680 wrote to memory of 952 3680 explorer.exe 122 PID 3680 wrote to memory of 3692 3680 explorer.exe 123 PID 3680 wrote to memory of 3692 3680 explorer.exe 123 PID 3680 wrote to memory of 3692 3680 explorer.exe 123 PID 3680 wrote to memory of 1700 3680 explorer.exe 124 PID 3680 wrote to memory of 1700 3680 explorer.exe 124 PID 3680 wrote to memory of 1700 3680 explorer.exe 124 PID 3680 wrote to memory of 1028 3680 explorer.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1487dd2c2fae2b2576393a80c5af60b0_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2764 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- Suspicious use of SetWindowsHookEx
PID:4468
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2024 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4140 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3284
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:368 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4712 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4524 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:388
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3848 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1964 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4932 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1548 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:388
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:952 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3288 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4476
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3932
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5096 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2944 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5232
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4720 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3924 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1356 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2368 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5364
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:768
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2864 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3444 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5640
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3188 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4124 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4288
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3988
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3144
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1340
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2776
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3468
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1076
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4324
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4112
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3644
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1500 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1484
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5632
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5688
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5500
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4280 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1528
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5548
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1768
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5988
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4616
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2972
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5224
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5416
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4752
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6008
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6116
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3012
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3148
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:692
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4168
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5992
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3476
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5460
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2492
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1876
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5a3ba0a3a0ce063fe03d5b4c608212d52
SHA1281264a2867f0563dd733f783eefeac56a677d3c
SHA2561a7fcedfd5659bf2db18b46e35986bfb716ced96a2a1f020096f032678ebd61e
SHA5121a59ac96a4645846a777fcb40daeb6f3f0e9fcef54e70d4d53fe1b17f2295457c876262bc1cf55e24ffbf4bf48a83608af50ceb40bcca582cba2092311004891
-
Filesize
2.2MB
MD5355277f27e17ba95032d6856b7e81eed
SHA13925d3a1bebb8133d3688d228da17f670fa2c146
SHA256dc1968d4a6798227e1fce1a6dc227acd202302294fd2140c7889ff44b43581ec
SHA512bc48581cfd63ad64a4c19358715a67bebd531ce1d8be10889a5086b89332595eab874a2da6676e4f2bb63d94cd45b278c3db62aec05746485f023d209256fb83