Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 22:01
Behavioral task
behavioral1
Sample
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
64ec197ee4e7767a0e8c482fbbeaac51
-
SHA1
c0b855826dc88971737b6a30afd1c2e6267d4365
-
SHA256
3a3527c4bf413197301e056f3c301d32b6671352dbe865f01f0a2472a348c814
-
SHA512
6309d5df02f02bc0c3978635205321cedf1d310ee8b1ab9bfa8ed8385ffd18305ffbc747e95fb8e0a03d1d22d5c0905cf263b465e4e7331c7cbfcbf0d0d42310
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZk:0UzeyQMS4DqodCnoe+iitjWww4
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exepid process 1724 explorer.exe 4920 explorer.exe 3452 spoolsv.exe 2652 spoolsv.exe 3764 spoolsv.exe 1436 spoolsv.exe 2568 spoolsv.exe 4144 spoolsv.exe 4260 spoolsv.exe 5032 spoolsv.exe 396 spoolsv.exe 1236 spoolsv.exe 2404 spoolsv.exe 4120 spoolsv.exe 4060 spoolsv.exe 4804 spoolsv.exe 3008 spoolsv.exe 4528 spoolsv.exe 2832 spoolsv.exe 2716 spoolsv.exe 1704 spoolsv.exe 3588 spoolsv.exe 4912 spoolsv.exe 1576 spoolsv.exe 5040 spoolsv.exe 5056 spoolsv.exe 4104 spoolsv.exe 4816 spoolsv.exe 4180 spoolsv.exe 1344 spoolsv.exe 2780 spoolsv.exe 2672 spoolsv.exe 1840 spoolsv.exe 3684 spoolsv.exe 4532 spoolsv.exe 2032 spoolsv.exe 1380 spoolsv.exe 2284 spoolsv.exe 3628 spoolsv.exe 2016 explorer.exe 1928 spoolsv.exe 1940 spoolsv.exe 5308 spoolsv.exe 5388 spoolsv.exe 5460 spoolsv.exe 5524 spoolsv.exe 5596 spoolsv.exe 5668 spoolsv.exe 5732 spoolsv.exe 1348 spoolsv.exe 116 explorer.exe 5236 spoolsv.exe 5332 spoolsv.exe 5392 spoolsv.exe 3484 spoolsv.exe 5580 spoolsv.exe 5648 spoolsv.exe 5644 spoolsv.exe 5088 spoolsv.exe 3136 spoolsv.exe 5808 spoolsv.exe 3424 spoolsv.exe 5160 explorer.exe 5344 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 51 IoCs
Processes:
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exedescription pid process target process PID 3628 set thread context of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 1724 set thread context of 4920 1724 explorer.exe explorer.exe PID 3452 set thread context of 3628 3452 spoolsv.exe spoolsv.exe PID 2652 set thread context of 1928 2652 spoolsv.exe spoolsv.exe PID 3764 set thread context of 1940 3764 spoolsv.exe spoolsv.exe PID 1436 set thread context of 5388 1436 spoolsv.exe spoolsv.exe PID 2568 set thread context of 5460 2568 spoolsv.exe spoolsv.exe PID 4144 set thread context of 5524 4144 spoolsv.exe spoolsv.exe PID 4260 set thread context of 5596 4260 spoolsv.exe spoolsv.exe PID 5032 set thread context of 5668 5032 spoolsv.exe spoolsv.exe PID 396 set thread context of 5732 396 spoolsv.exe spoolsv.exe PID 1236 set thread context of 1348 1236 spoolsv.exe spoolsv.exe PID 2404 set thread context of 5236 2404 spoolsv.exe spoolsv.exe PID 4120 set thread context of 5332 4120 spoolsv.exe spoolsv.exe PID 4060 set thread context of 3484 4060 spoolsv.exe spoolsv.exe PID 4804 set thread context of 5580 4804 spoolsv.exe spoolsv.exe PID 3008 set thread context of 5648 3008 spoolsv.exe spoolsv.exe PID 4528 set thread context of 5644 4528 spoolsv.exe spoolsv.exe PID 2832 set thread context of 5088 2832 spoolsv.exe spoolsv.exe PID 2716 set thread context of 3136 2716 spoolsv.exe spoolsv.exe PID 1704 set thread context of 5808 1704 spoolsv.exe spoolsv.exe PID 3588 set thread context of 3424 3588 spoolsv.exe spoolsv.exe PID 4912 set thread context of 2628 4912 spoolsv.exe spoolsv.exe PID 1576 set thread context of 3352 1576 spoolsv.exe spoolsv.exe PID 5040 set thread context of 4044 5040 spoolsv.exe spoolsv.exe PID 5056 set thread context of 5500 5056 spoolsv.exe spoolsv.exe PID 4104 set thread context of 5372 4104 spoolsv.exe spoolsv.exe PID 4816 set thread context of 3728 4816 spoolsv.exe spoolsv.exe PID 4180 set thread context of 3960 4180 spoolsv.exe spoolsv.exe PID 1344 set thread context of 2420 1344 spoolsv.exe spoolsv.exe PID 2780 set thread context of 1020 2780 spoolsv.exe spoolsv.exe PID 2672 set thread context of 5100 2672 spoolsv.exe spoolsv.exe PID 1840 set thread context of 4948 1840 spoolsv.exe spoolsv.exe PID 3684 set thread context of 1384 3684 spoolsv.exe spoolsv.exe PID 4532 set thread context of 5296 4532 spoolsv.exe spoolsv.exe PID 2032 set thread context of 3800 2032 spoolsv.exe spoolsv.exe PID 1380 set thread context of 5632 1380 spoolsv.exe spoolsv.exe PID 2284 set thread context of 2924 2284 spoolsv.exe spoolsv.exe PID 2016 set thread context of 1828 2016 explorer.exe explorer.exe PID 5308 set thread context of 5516 5308 spoolsv.exe spoolsv.exe PID 116 set thread context of 3384 116 explorer.exe explorer.exe PID 5392 set thread context of 5504 5392 spoolsv.exe spoolsv.exe PID 5160 set thread context of 4596 5160 explorer.exe explorer.exe PID 5344 set thread context of 1560 5344 spoolsv.exe spoolsv.exe PID 5872 set thread context of 5288 5872 spoolsv.exe spoolsv.exe PID 5284 set thread context of 640 5284 explorer.exe explorer.exe PID 4084 set thread context of 4820 4084 spoolsv.exe spoolsv.exe PID 1752 set thread context of 5696 1752 explorer.exe explorer.exe PID 6008 set thread context of 4444 6008 spoolsv.exe spoolsv.exe PID 5192 set thread context of 1268 5192 spoolsv.exe spoolsv.exe PID 4736 set thread context of 5420 4736 explorer.exe explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
explorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exeexplorer.exepid process 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4920 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 4920 explorer.exe 3628 spoolsv.exe 3628 spoolsv.exe 1928 spoolsv.exe 1928 spoolsv.exe 1940 spoolsv.exe 1940 spoolsv.exe 5388 spoolsv.exe 5388 spoolsv.exe 5460 spoolsv.exe 5460 spoolsv.exe 5524 spoolsv.exe 5524 spoolsv.exe 5596 spoolsv.exe 5596 spoolsv.exe 5668 spoolsv.exe 5668 spoolsv.exe 5732 spoolsv.exe 5732 spoolsv.exe 1348 spoolsv.exe 1348 spoolsv.exe 5236 spoolsv.exe 5236 spoolsv.exe 5332 spoolsv.exe 5332 spoolsv.exe 3484 spoolsv.exe 3484 spoolsv.exe 5580 spoolsv.exe 5580 spoolsv.exe 5648 spoolsv.exe 5648 spoolsv.exe 5644 spoolsv.exe 5644 spoolsv.exe 5088 spoolsv.exe 5088 spoolsv.exe 3136 spoolsv.exe 3136 spoolsv.exe 5808 spoolsv.exe 5808 spoolsv.exe 3424 spoolsv.exe 3424 spoolsv.exe 2628 spoolsv.exe 2628 spoolsv.exe 3352 spoolsv.exe 3352 spoolsv.exe 4044 spoolsv.exe 4044 spoolsv.exe 5500 spoolsv.exe 5500 spoolsv.exe 5372 spoolsv.exe 5372 spoolsv.exe 3728 spoolsv.exe 3728 spoolsv.exe 3960 spoolsv.exe 3960 spoolsv.exe 2420 spoolsv.exe 2420 spoolsv.exe 1020 spoolsv.exe 1020 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 3628 wrote to memory of 712 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe splwow64.exe PID 3628 wrote to memory of 712 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe splwow64.exe PID 3628 wrote to memory of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 3628 wrote to memory of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 3628 wrote to memory of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 3628 wrote to memory of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 3628 wrote to memory of 3716 3628 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe PID 3716 wrote to memory of 1724 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe explorer.exe PID 3716 wrote to memory of 1724 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe explorer.exe PID 3716 wrote to memory of 1724 3716 64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe explorer.exe PID 1724 wrote to memory of 4920 1724 explorer.exe explorer.exe PID 1724 wrote to memory of 4920 1724 explorer.exe explorer.exe PID 1724 wrote to memory of 4920 1724 explorer.exe explorer.exe PID 1724 wrote to memory of 4920 1724 explorer.exe explorer.exe PID 1724 wrote to memory of 4920 1724 explorer.exe explorer.exe PID 4920 wrote to memory of 3452 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3452 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3452 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2652 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2652 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2652 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3764 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3764 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3764 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1436 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1436 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1436 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2568 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2568 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2568 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4144 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4144 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4144 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4260 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4260 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4260 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 5032 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 5032 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 5032 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 396 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 396 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 396 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1236 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1236 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 1236 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2404 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2404 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2404 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4120 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4120 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4120 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4060 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4060 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4060 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4804 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4804 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4804 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3008 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3008 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 3008 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4528 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4528 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 4528 4920 explorer.exe spoolsv.exe PID 4920 wrote to memory of 2832 4920 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64ec197ee4e7767a0e8c482fbbeaac51_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2016 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1828
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2652 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3764 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5388 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2568 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5460 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5524 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5596 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5732 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:116 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3384
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5236 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4120 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5332 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3484 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5580 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5644 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2716 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3136 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5808 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5160 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4596
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2628 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3352 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5040 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5500 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5372 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3728 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3960 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2420 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:5284 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:640
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2780 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1020 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5100
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4948
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1384
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5296
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3800
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5632
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1752 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5696
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2284 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2924
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4736 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5420
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5516
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5840 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5128
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5392 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5504
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:432 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1560
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4716 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5288
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1720
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4820
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:6008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4444
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1268
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5364
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3652 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4492
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1552
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1016
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5520
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3124 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2344
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5932
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2604
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5936
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4748 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5292
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4380
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5224
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3372
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2536
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2400
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5020
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3144 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:728 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2276 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5216
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4248 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4732 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:444 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4664 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:6084 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1804
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5816
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5ac68fe737655b26271620875f3a03572
SHA1613cc2e31057d053ecbbfe3f4f5ac13f37612db5
SHA2568b5b6969c9138b926f1bbd2a2981cdaaabf2c7f7d61d1dcd2bc77dd7ac1834d3
SHA51286b573e41ecab3e1b91224233489025acd6161bbd17686b189b3d6ea23f98ff4e776b97b37c7aed7d752296dcd5ad9a1cdcb3561d2981ea296fbd1c2943c3948
-
Filesize
2.2MB
MD5422bd64e39429a287f67ed68fa0109ae
SHA1b508620f78a3b7b0c615b8d3c40c61537823e673
SHA256fef20a90b6825b57c0a61a3ee79b2cb29f8f698c71f58f1582c205d69c4ddcd2
SHA51291c1747921cfcabcabe41c34ea85ea2bf59ba081d2cf4a28d480b3b555070c4c22c190763fcac40a72e04c1e0a5ceeb1bc04146dcc795efa06270f40309aa14f