Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 14:12
Behavioral task
behavioral1
Sample
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
180d4ff0b0c19ca847cdca2e0b2332e0
-
SHA1
c792e1065daff1828fd3bf679dd50f38abb30093
-
SHA256
7f4e5667cffa8c7dcbf7496f3eba5a7dd6449194fbec0fa7dcc6558d3042b240
-
SHA512
ee7598c7d1a02a38917ac7c2f15b5398f5fe639726cf616fc8b78301be53298a8f1d9b74c2aa38b09109523a4e4a426a315a664307385a6de62c61f517e32104
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHb:ATU7AAmw4gxeOw46fUbNecCCFbNecE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 33 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 556 explorer.exe 1584 explorer.exe 1812 explorer.exe 1548 spoolsv.exe 1404 spoolsv.exe 2188 spoolsv.exe 312 spoolsv.exe 2760 spoolsv.exe 2764 spoolsv.exe 2096 spoolsv.exe 3012 spoolsv.exe 2772 spoolsv.exe 2864 spoolsv.exe 2980 spoolsv.exe 1496 spoolsv.exe 1368 spoolsv.exe 960 spoolsv.exe 576 spoolsv.exe 1676 spoolsv.exe 2228 spoolsv.exe 2648 spoolsv.exe 1576 spoolsv.exe 2972 spoolsv.exe 2772 spoolsv.exe 2076 spoolsv.exe 1492 spoolsv.exe 2552 spoolsv.exe 2084 spoolsv.exe 1068 spoolsv.exe 2320 spoolsv.exe 1256 spoolsv.exe 2372 spoolsv.exe 888 spoolsv.exe 900 spoolsv.exe 2936 spoolsv.exe 2408 spoolsv.exe 2336 spoolsv.exe 1200 spoolsv.exe 2624 spoolsv.exe 2784 spoolsv.exe 828 spoolsv.exe 1320 spoolsv.exe 2280 spoolsv.exe 1612 spoolsv.exe 2496 spoolsv.exe 2368 spoolsv.exe 2724 spoolsv.exe 2768 spoolsv.exe 2408 spoolsv.exe 2472 spoolsv.exe 1972 spoolsv.exe 328 spoolsv.exe 2244 spoolsv.exe 2940 spoolsv.exe 548 spoolsv.exe 2600 spoolsv.exe 2504 spoolsv.exe 2100 spoolsv.exe 2844 spoolsv.exe 2776 spoolsv.exe 784 spoolsv.exe 936 spoolsv.exe 1620 spoolsv.exe 1788 spoolsv.exe -
Loads dropped DLL 64 IoCs
Processes:
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 1812 explorer.exe 1812 explorer.exe 1548 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2188 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2760 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2096 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2772 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2980 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 1368 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 576 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2228 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 1576 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2772 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 1492 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2084 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2320 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2372 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 900 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2408 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 1200 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2784 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 1320 spoolsv.exe 1812 explorer.exe 1812 explorer.exe -
Processes:
resource yara_rule behavioral1/memory/1304-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1304-43-0x0000000000400000-0x0000000000446000-memory.dmp upx C:\Windows\system\explorer.exe upx behavioral1/memory/556-94-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/556-138-0x0000000000400000-0x0000000000446000-memory.dmp upx C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe upx \Windows\system\spoolsv.exe upx behavioral1/memory/1548-190-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1548-235-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2188-247-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2760-301-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2096-357-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2772-413-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2980-468-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1368-520-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/576-577-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2228-630-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1576-685-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2772-742-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1492-791-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2084-842-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2320-892-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1812-890-0x0000000000540000-0x0000000000586000-memory.dmp upx behavioral1/memory/2372-941-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/900-988-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2408-1040-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Adds Run key to start application 2 TTPs 15 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" spoolsv.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exedescription pid process target process PID 1304 set thread context of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 set thread context of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 556 set thread context of 1584 556 explorer.exe explorer.exe PID 1584 set thread context of 1812 1584 explorer.exe explorer.exe PID 1584 set thread context of 1108 1584 explorer.exe diskperf.exe PID 1548 set thread context of 1404 1548 spoolsv.exe spoolsv.exe PID 2188 set thread context of 312 2188 spoolsv.exe spoolsv.exe PID 2760 set thread context of 2764 2760 spoolsv.exe spoolsv.exe PID 2096 set thread context of 3012 2096 spoolsv.exe spoolsv.exe PID 2772 set thread context of 2864 2772 spoolsv.exe spoolsv.exe PID 2980 set thread context of 1496 2980 spoolsv.exe spoolsv.exe PID 1368 set thread context of 960 1368 spoolsv.exe spoolsv.exe PID 576 set thread context of 1676 576 spoolsv.exe spoolsv.exe PID 2228 set thread context of 2648 2228 spoolsv.exe spoolsv.exe PID 1576 set thread context of 2972 1576 spoolsv.exe spoolsv.exe PID 2772 set thread context of 2076 2772 spoolsv.exe spoolsv.exe PID 1492 set thread context of 2552 1492 spoolsv.exe spoolsv.exe PID 2084 set thread context of 1068 2084 spoolsv.exe spoolsv.exe PID 2320 set thread context of 1256 2320 spoolsv.exe spoolsv.exe PID 2372 set thread context of 888 2372 spoolsv.exe spoolsv.exe PID 900 set thread context of 2936 900 spoolsv.exe spoolsv.exe PID 2408 set thread context of 2336 2408 spoolsv.exe spoolsv.exe PID 1200 set thread context of 2624 1200 spoolsv.exe spoolsv.exe PID 2784 set thread context of 828 2784 spoolsv.exe spoolsv.exe PID 1320 set thread context of 2280 1320 spoolsv.exe spoolsv.exe PID 1612 set thread context of 2496 1612 spoolsv.exe spoolsv.exe PID 2368 set thread context of 2724 2368 spoolsv.exe spoolsv.exe PID 2768 set thread context of 2408 2768 spoolsv.exe spoolsv.exe PID 2472 set thread context of 1972 2472 spoolsv.exe spoolsv.exe PID 328 set thread context of 2244 328 spoolsv.exe spoolsv.exe PID 2940 set thread context of 548 2940 spoolsv.exe spoolsv.exe PID 2600 set thread context of 2504 2600 spoolsv.exe spoolsv.exe PID 2100 set thread context of 2844 2100 spoolsv.exe spoolsv.exe PID 2776 set thread context of 784 2776 spoolsv.exe spoolsv.exe PID 936 set thread context of 1620 936 spoolsv.exe spoolsv.exe PID 1788 set thread context of 788 1788 spoolsv.exe spoolsv.exe PID 2932 set thread context of 2084 2932 spoolsv.exe spoolsv.exe PID 2924 set thread context of 2460 2924 spoolsv.exe spoolsv.exe PID 2800 set thread context of 1056 2800 spoolsv.exe spoolsv.exe PID 2628 set thread context of 2760 2628 spoolsv.exe spoolsv.exe PID 1704 set thread context of 1564 1704 spoolsv.exe spoolsv.exe PID 1404 set thread context of 1064 1404 spoolsv.exe spoolsv.exe PID 1404 set thread context of 1200 1404 spoolsv.exe diskperf.exe PID 808 set thread context of 1624 808 spoolsv.exe spoolsv.exe PID 2064 set thread context of 2932 2064 explorer.exe explorer.exe PID 312 set thread context of 968 312 spoolsv.exe spoolsv.exe PID 312 set thread context of 2476 312 spoolsv.exe diskperf.exe PID 2764 set thread context of 1600 2764 spoolsv.exe spoolsv.exe PID 2764 set thread context of 3028 2764 spoolsv.exe diskperf.exe PID 2068 set thread context of 2432 2068 spoolsv.exe spoolsv.exe PID 2628 set thread context of 2132 2628 explorer.exe explorer.exe PID 3012 set thread context of 1964 3012 spoolsv.exe spoolsv.exe PID 3012 set thread context of 280 3012 spoolsv.exe diskperf.exe PID 2864 set thread context of 1752 2864 spoolsv.exe spoolsv.exe PID 2864 set thread context of 2436 2864 spoolsv.exe diskperf.exe PID 940 set thread context of 2452 940 spoolsv.exe spoolsv.exe PID 2220 set thread context of 1016 2220 explorer.exe explorer.exe PID 1496 set thread context of 2488 1496 spoolsv.exe spoolsv.exe PID 1496 set thread context of 900 1496 spoolsv.exe diskperf.exe PID 960 set thread context of 1748 960 spoolsv.exe spoolsv.exe PID 960 set thread context of 1532 960 spoolsv.exe diskperf.exe PID 1764 set thread context of 2008 1764 spoolsv.exe spoolsv.exe PID 1676 set thread context of 592 1676 spoolsv.exe spoolsv.exe PID 2992 set thread context of 2980 2992 explorer.exe explorer.exe -
Drops file in Windows directory 53 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 556 explorer.exe 1548 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2188 spoolsv.exe 1812 explorer.exe 2760 spoolsv.exe 1812 explorer.exe 2096 spoolsv.exe 1812 explorer.exe 2772 spoolsv.exe 1812 explorer.exe 2980 spoolsv.exe 1812 explorer.exe 1368 spoolsv.exe 1812 explorer.exe 576 spoolsv.exe 1812 explorer.exe 2228 spoolsv.exe 1812 explorer.exe 1576 spoolsv.exe 1812 explorer.exe 2772 spoolsv.exe 1812 explorer.exe 1492 spoolsv.exe 1812 explorer.exe 2084 spoolsv.exe 1812 explorer.exe 2320 spoolsv.exe 1812 explorer.exe 2372 spoolsv.exe 1812 explorer.exe 900 spoolsv.exe 1812 explorer.exe 2408 spoolsv.exe 1812 explorer.exe 1200 spoolsv.exe 1812 explorer.exe 2784 spoolsv.exe 1812 explorer.exe 1320 spoolsv.exe 1812 explorer.exe 1612 spoolsv.exe 1812 explorer.exe 2368 spoolsv.exe 1812 explorer.exe 2768 spoolsv.exe 1812 explorer.exe 2472 spoolsv.exe 1812 explorer.exe 328 spoolsv.exe 1812 explorer.exe 2940 spoolsv.exe 1812 explorer.exe 2600 spoolsv.exe 1812 explorer.exe 2100 spoolsv.exe 1812 explorer.exe 2776 spoolsv.exe 1812 explorer.exe 936 spoolsv.exe 1812 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 556 explorer.exe 556 explorer.exe 1812 explorer.exe 1812 explorer.exe 1548 spoolsv.exe 1548 spoolsv.exe 1812 explorer.exe 1812 explorer.exe 2188 spoolsv.exe 2188 spoolsv.exe 2760 spoolsv.exe 2760 spoolsv.exe 2096 spoolsv.exe 2096 spoolsv.exe 2772 spoolsv.exe 2772 spoolsv.exe 2980 spoolsv.exe 2980 spoolsv.exe 1368 spoolsv.exe 1368 spoolsv.exe 576 spoolsv.exe 576 spoolsv.exe 2228 spoolsv.exe 2228 spoolsv.exe 1576 spoolsv.exe 1576 spoolsv.exe 2772 spoolsv.exe 2772 spoolsv.exe 1492 spoolsv.exe 1492 spoolsv.exe 2084 spoolsv.exe 2084 spoolsv.exe 2320 spoolsv.exe 2320 spoolsv.exe 2372 spoolsv.exe 2372 spoolsv.exe 900 spoolsv.exe 900 spoolsv.exe 2408 spoolsv.exe 2408 spoolsv.exe 1200 spoolsv.exe 1200 spoolsv.exe 2784 spoolsv.exe 2784 spoolsv.exe 1320 spoolsv.exe 1320 spoolsv.exe 1612 spoolsv.exe 1612 spoolsv.exe 2368 spoolsv.exe 2368 spoolsv.exe 2768 spoolsv.exe 2768 spoolsv.exe 2472 spoolsv.exe 2472 spoolsv.exe 328 spoolsv.exe 328 spoolsv.exe 2940 spoolsv.exe 2940 spoolsv.exe 2600 spoolsv.exe 2600 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeexplorer.exedescription pid process target process PID 1304 wrote to memory of 2280 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2280 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2280 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 2280 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe cmd.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 1304 wrote to memory of 320 1304 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2128 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe PID 320 wrote to memory of 2696 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe diskperf.exe PID 320 wrote to memory of 2696 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe diskperf.exe PID 320 wrote to memory of 2696 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe diskperf.exe PID 320 wrote to memory of 2696 320 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe diskperf.exe PID 2128 wrote to memory of 556 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe explorer.exe PID 2128 wrote to memory of 556 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe explorer.exe PID 2128 wrote to memory of 556 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe explorer.exe PID 2128 wrote to memory of 556 2128 180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe explorer.exe PID 556 wrote to memory of 2832 556 explorer.exe cmd.exe PID 556 wrote to memory of 2832 556 explorer.exe cmd.exe PID 556 wrote to memory of 2832 556 explorer.exe cmd.exe PID 556 wrote to memory of 2832 556 explorer.exe cmd.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe PID 556 wrote to memory of 1584 556 explorer.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\180d4ff0b0c19ca847cdca2e0b2332e0_JaffaCakes118.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:2832 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1584 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1812 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:944 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1404 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1064
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:1052 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2932
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1200
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1580
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:312 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:968
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2476
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2976 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2764 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1600
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:1644 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2132
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:3028
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2620 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1964
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:280
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:3028
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2864 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1752
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:2264 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:1016
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:2436
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:772
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2488
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:1536 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2980
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:900
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:960 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1748
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1532
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1608
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1676 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:592
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1448
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2556
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Drops file in Windows directory
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵PID:2580
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2860
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1960
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2876 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:1740
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1492
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2076 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2296
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe10⤵
- Drops file in Windows directory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"11⤵
- Drops startup file
PID:2828 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵PID:2212
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"9⤵PID:1952
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2884
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2552 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe9⤵PID:2144
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1380
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1068 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2940
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1256 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:280
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:888 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2892 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2872 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2336 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2624 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2244 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:828 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1664 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2280 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2496 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:3008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2724 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1636 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2408 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2948 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2812 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2244 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1796
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:548 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2716
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2504 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2904 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:2844 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2896 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:784 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2692 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
PID:1620 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2720
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:788
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2204
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2084
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2576
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2460
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2456
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1056
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:3036 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2760
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2768 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1564
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:1044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1624
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1696
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2512
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:3020 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2432
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2636 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2452
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:2012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2008
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Drops file in Windows directory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:328
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2464
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Drops file in Windows directory
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2956
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:2484
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Drops file in Windows directory
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
PID:868 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1380
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1108
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5180d4ff0b0c19ca847cdca2e0b2332e0
SHA1c792e1065daff1828fd3bf679dd50f38abb30093
SHA2567f4e5667cffa8c7dcbf7496f3eba5a7dd6449194fbec0fa7dcc6558d3042b240
SHA512ee7598c7d1a02a38917ac7c2f15b5398f5fe639726cf616fc8b78301be53298a8f1d9b74c2aa38b09109523a4e4a426a315a664307385a6de62c61f517e32104
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD563075a0efe41d8a27a6eefa18a000a72
SHA1b07ce98ba03d01dc4dcd0b684dbe26091dc758dd
SHA256599919ceec14776f82f993b1074e0d09275a43e6a83ffbd76dcdf0b49d1dfb63
SHA51262d7d3cd152f69953e20e146813ceef6553d2bb4826cfc505dd33a126b062d8fadd485afd771a486806f479797e62c13405266d5d26d393588b9d9eba658e27e
-
Filesize
2.9MB
MD5f6e4681460128fbf0545efca410893e9
SHA1ba1b2af7062a55eee8b35cd1f742b3296b9c45be
SHA2564f3846284542a312b81b13f4018c2ee2f6ae93ebca9b0b4bc6182028abfb33a7
SHA512ba3c19ae21cf7d932ea2d2c17e66024e94d382aea45d46687723c128ff6ea2f93df3d17483a376f0599fe1774b4013744246099005a571486253d04039ffb0eb