Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 07:46
Behavioral task
behavioral1
Sample
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
16ab99e0ac1897405a4d16b44b29c0af
-
SHA1
e0e474c2748c474810774622dee6a77e31e58f1a
-
SHA256
ab0d602717ad9c3085c21ea4cb3bbf53c47c22d74112d7f69fba26efe5cedaf6
-
SHA512
7dc4494c23b3d9245a1340bd46020172fa5a62c2220e63af63fecf21e6b96503982c89fc2b9d468dce583911b6212243f0fcdfb02f1eeb9fe11f06cc3bc1ca33
-
SSDEEP
12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kj:OIbGD2JTu0GoZQDbGV6eH81kj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\System\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\System\spoolsv.exe warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Processes:
resource yara_rule C:\Windows\System\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 C:\Windows\System\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1420 explorer.exe 2532 explorer.exe 2964 spoolsv.exe 4060 spoolsv.exe 1108 spoolsv.exe 4268 spoolsv.exe 4240 spoolsv.exe 3200 spoolsv.exe 4116 spoolsv.exe 1092 spoolsv.exe 3140 spoolsv.exe 3532 spoolsv.exe 4748 spoolsv.exe 2636 spoolsv.exe 4776 spoolsv.exe 4740 spoolsv.exe 4168 spoolsv.exe 1132 spoolsv.exe 1408 spoolsv.exe 2148 spoolsv.exe 3848 spoolsv.exe 4348 spoolsv.exe 1236 spoolsv.exe 452 spoolsv.exe 4620 spoolsv.exe 3640 spoolsv.exe 3676 spoolsv.exe 2856 spoolsv.exe 908 spoolsv.exe 4032 spoolsv.exe 1100 spoolsv.exe 3992 spoolsv.exe 2844 spoolsv.exe 396 spoolsv.exe 4484 spoolsv.exe 1420 spoolsv.exe 4424 spoolsv.exe 4912 spoolsv.exe 4500 spoolsv.exe 2468 spoolsv.exe 4672 spoolsv.exe 3104 spoolsv.exe 1708 spoolsv.exe 4048 spoolsv.exe 4940 spoolsv.exe 4788 spoolsv.exe 1696 spoolsv.exe 4736 spoolsv.exe 4856 spoolsv.exe 4988 spoolsv.exe 2592 spoolsv.exe 4220 spoolsv.exe 3060 spoolsv.exe 1284 spoolsv.exe 3152 spoolsv.exe 1436 spoolsv.exe 1900 spoolsv.exe 4336 spoolsv.exe 4768 spoolsv.exe 3504 spoolsv.exe 4792 spoolsv.exe 1744 spoolsv.exe 4152 spoolsv.exe 5080 spoolsv.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exe16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe -
Suspicious use of SetThreadContext 16 IoCs
Processes:
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 4664 set thread context of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 set thread context of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 1420 set thread context of 2532 1420 explorer.exe explorer.exe PID 1420 set thread context of 4528 1420 explorer.exe diskperf.exe PID 2964 set thread context of 5468 2964 spoolsv.exe spoolsv.exe PID 2964 set thread context of 5492 2964 spoolsv.exe diskperf.exe PID 4060 set thread context of 5600 4060 spoolsv.exe spoolsv.exe PID 4060 set thread context of 5612 4060 spoolsv.exe diskperf.exe PID 1108 set thread context of 5732 1108 spoolsv.exe spoolsv.exe PID 1108 set thread context of 5744 1108 spoolsv.exe diskperf.exe PID 4268 set thread context of 5816 4268 spoolsv.exe spoolsv.exe PID 4268 set thread context of 5840 4268 spoolsv.exe diskperf.exe PID 4240 set thread context of 5916 4240 spoolsv.exe spoolsv.exe PID 4240 set thread context of 5932 4240 spoolsv.exe diskperf.exe PID 3200 set thread context of 6028 3200 spoolsv.exe spoolsv.exe PID 3200 set thread context of 6040 3200 spoolsv.exe diskperf.exe -
Drops file in Windows directory 4 IoCs
Processes:
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exepid process 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2532 explorer.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 5468 spoolsv.exe 5468 spoolsv.exe 5600 spoolsv.exe 5600 spoolsv.exe 5732 spoolsv.exe 5732 spoolsv.exe 5816 spoolsv.exe 5816 spoolsv.exe 5916 spoolsv.exe 5916 spoolsv.exe 6028 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4360 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe PID 4664 wrote to memory of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 4664 wrote to memory of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 4664 wrote to memory of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 4664 wrote to memory of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 4664 wrote to memory of 4224 4664 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe diskperf.exe PID 4360 wrote to memory of 1420 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe explorer.exe PID 4360 wrote to memory of 1420 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe explorer.exe PID 4360 wrote to memory of 1420 4360 16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 2532 1420 explorer.exe explorer.exe PID 1420 wrote to memory of 4528 1420 explorer.exe diskperf.exe PID 1420 wrote to memory of 4528 1420 explorer.exe diskperf.exe PID 1420 wrote to memory of 4528 1420 explorer.exe diskperf.exe PID 1420 wrote to memory of 4528 1420 explorer.exe diskperf.exe PID 1420 wrote to memory of 4528 1420 explorer.exe diskperf.exe PID 2532 wrote to memory of 2964 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 2964 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 2964 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4060 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4060 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4060 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1108 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1108 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1108 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4268 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4268 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4268 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4240 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4240 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4240 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3200 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3200 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3200 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4116 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4116 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4116 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1092 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1092 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 1092 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3140 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3140 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3140 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3532 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3532 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 3532 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4748 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4748 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 4748 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 2636 2532 explorer.exe spoolsv.exe PID 2532 wrote to memory of 2636 2532 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16ab99e0ac1897405a4d16b44b29c0af_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2964 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:5468 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5660
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5492
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4060 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:5600 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5612
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1108 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:5732 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5804
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5744
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4268 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:5816 -
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5840
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4240 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:5916 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5992
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5932
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3200 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵
- Suspicious use of SetWindowsHookEx
PID:6028 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6100
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6040
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4116 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:6140
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5204
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5124
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1092 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5276
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5404
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5288
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3140 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5452
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5560
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5484
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5584
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:4084
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3792
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4748 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5720
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5792
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5708
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2636 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5904
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:6012
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5944
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4776 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5140
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:3432
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4740 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5348
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5416
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:5324
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4168 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE6⤵PID:5656
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe7⤵PID:5684
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:6136
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1132 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1408 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2148 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3848 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4348 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1236 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:452 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4620 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3640 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3676 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2856 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:908 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4032 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3992 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2844 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:396 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4484 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1420 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4424 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4912 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4500 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2468 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4672 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3104 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1708 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4048 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4940 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4788 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1696 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4736 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4856 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4988 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2592 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4220 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3060 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1284 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3152 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1436 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1900 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4336 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4768 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3504 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4792 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1744 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4152 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5080 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3964
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3080
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5060
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2916
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:756
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2248
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:668
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:536
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:416
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:612
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3904
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2024
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3148
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4264
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4716
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3084
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3828
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:876
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5084
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3448
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:376
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5180
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5212
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5260
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5296
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5336
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5376
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5424
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5460
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5588
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:4528
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:4224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD516ab99e0ac1897405a4d16b44b29c0af
SHA1e0e474c2748c474810774622dee6a77e31e58f1a
SHA256ab0d602717ad9c3085c21ea4cb3bbf53c47c22d74112d7f69fba26efe5cedaf6
SHA5127dc4494c23b3d9245a1340bd46020172fa5a62c2220e63af63fecf21e6b96503982c89fc2b9d468dce583911b6212243f0fcdfb02f1eeb9fe11f06cc3bc1ca33
-
Filesize
1.2MB
MD5cf2a00b7367635ae697233b00e7471c4
SHA1de7520783ae56cbc59d9c542beb11d77d98be3d2
SHA2560d26cc68424c8255f317edee72d791bb71867e519658d8c6c14efb76c674c3c0
SHA5123b8f6e07855a966238f940252c7b27d03a22a9fe8a5b3fc029187b169ab996822f6d0576b17161dce42d8226a65315c06aff8add5f8aebf58b75c196a51e57ed
-
Filesize
1.2MB
MD5568ad7dc502e4e5200ff771d3bb0186e
SHA1065d76668ac32960294a3de21652e0c6fa03fcbd
SHA2563fd73b881a1fb467e64dbb2b7f093bdd013718cab3b7e1143a2989f43c21930e
SHA5127fe0ecfe9960687031c36f9e2ae7951ed5822198491a7362bf3ade122b51eef5c27042d32a67b5da57047c576550a044ee376eea39e0005ad6b75dd3b37aacae