Analysis
-
max time kernel
69s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 22:09
Behavioral task
behavioral1
Sample
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
570f95c7a34e9c11f4227bfe194b233f
-
SHA1
1108ae050dee2f263c1b54dc2f1f8fc8f93285ab
-
SHA256
76e86389d4a185a712524bad2098581383f6b909fdd922d443d28dcd9751d432
-
SHA512
8661a46b5dc085c3171a39ba871048b4855406f5f74f279edcccbecfc8e4cd543174676d0e97aca084e7a91cbd500eb154975e56ff336737a5fd1397a7f9e13e
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZU:0UzeyQMS4DqodCnoe+iitjWwwA
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
Processes:
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe -
Executes dropped EXE 18 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1112 explorer.exe 4064 explorer.exe 4484 spoolsv.exe 2024 spoolsv.exe 4488 spoolsv.exe 3492 spoolsv.exe 3604 spoolsv.exe 4208 spoolsv.exe 3992 spoolsv.exe 1664 spoolsv.exe 3236 spoolsv.exe 3756 spoolsv.exe 752 spoolsv.exe 3856 spoolsv.exe 2000 spoolsv.exe 872 spoolsv.exe 3732 spoolsv.exe 1700 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exeexplorer.exedescription pid process target process PID 1004 set thread context of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 1112 set thread context of 4064 1112 explorer.exe explorer.exe -
Drops file in Windows directory 20 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exe570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exeexplorer.exepid process 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exeexplorer.exepid process 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe 4064 explorer.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 1004 wrote to memory of 4292 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe splwow64.exe PID 1004 wrote to memory of 4292 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe splwow64.exe PID 1004 wrote to memory of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 1004 wrote to memory of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 1004 wrote to memory of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 1004 wrote to memory of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 1004 wrote to memory of 3020 1004 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe PID 3020 wrote to memory of 1112 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe explorer.exe PID 3020 wrote to memory of 1112 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe explorer.exe PID 3020 wrote to memory of 1112 3020 570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe explorer.exe PID 1112 wrote to memory of 4064 1112 explorer.exe explorer.exe PID 1112 wrote to memory of 4064 1112 explorer.exe explorer.exe PID 1112 wrote to memory of 4064 1112 explorer.exe explorer.exe PID 1112 wrote to memory of 4064 1112 explorer.exe explorer.exe PID 1112 wrote to memory of 4064 1112 explorer.exe explorer.exe PID 4064 wrote to memory of 4484 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4484 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4484 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2024 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2024 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2024 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4488 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4488 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4488 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3492 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3492 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3492 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3604 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3604 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3604 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4208 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4208 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 4208 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3992 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3992 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3992 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1664 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1664 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1664 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3236 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3236 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3236 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3756 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3756 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3756 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 752 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 752 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 752 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3856 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3856 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3856 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2000 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2000 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 2000 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 872 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 872 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 872 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3732 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3732 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 3732 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1700 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1700 4064 explorer.exe spoolsv.exe PID 4064 wrote to memory of 1700 4064 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\570f95c7a34e9c11f4227bfe194b233f_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2996
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5156
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:384
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2024 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5372
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4492
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1504
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4488 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5620
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:536
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4432
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4848
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5552
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1000
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1664 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3756 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2256
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3920
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4380
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3732 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2476
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4632
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4928
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1588
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4688
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:620
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2612
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2008
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4884
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4008
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4716
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4276
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4300
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1540
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4956
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4776
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:548
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3708
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1252
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2316
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4844
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1800
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1436
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3276
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5200
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5484
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5788
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6088
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5328
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5676
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6000
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5260
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5648
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5980
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5472
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5900
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3840
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:400
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5872
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5320
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5772
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5240
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5976
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5832
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1068
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5628
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5080
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3820
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4944
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6080
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5856
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5576
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3968
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3892
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3796
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4412
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5656
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5132
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5716
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4664
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4304
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5048
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3528
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4548
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5664
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5304
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD551ec54778130e141d2576441d47efca7
SHA11af03d61f29c39d314a379d57b524122fa8c2fea
SHA256033cacc4e97b8185bd1480e37b1ed8a78cf5aaa7dfb3eb7f97f68896687489fd
SHA51234a3e39a427822a67b6e83fbad1e42e31277687aa8870681515958ccac7b9bacaf79d56cb62caa2f5ee8a2c85912406bea4baf2cf8086182cdfd1e3e714d8cd0
-
Filesize
2.2MB
MD52e6cb24dccc88280f863b7d3a2b50143
SHA1d3731293532bb1a2d6f370f92f275f06fee4f584
SHA2568e7a7ce8bfda849ebd8e96956344f3e14644893a85a7c8ee4684e40ea95c9be7
SHA51231c1328a2a57b386fb7dee56bc345e9d4317c8297a3804051e5a61a052b9b5fc096fbe5c0aaf090e98716170925b974ecd9952fae0a430d1aca3a1f7200c8eeb