Analysis
-
max time kernel
129s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 15:39
Behavioral task
behavioral1
Sample
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
6f0247bae5f3fc2b6ec644ef5a5a2907
-
SHA1
c6e2cc6e2aa0560848c7a476a866dd25161cae2a
-
SHA256
995a09cb8c096619aa04052f24b33f5af652fc17324ebbae31b9e914d4c0d6cf
-
SHA512
14dbe2f2a5e9aac2f353b211ab05fcb032b701a5d4c90c72d06b2555045c9fb6ec51e1942b2c5bb2be32af561a046f430662b0f349d3f56673285730e8eaa5f8
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZG:0UzeyQMS4DqodCnoe+iitjWwwy
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 264 explorer.exe 1440 explorer.exe 2200 spoolsv.exe 932 spoolsv.exe 3848 spoolsv.exe 2264 spoolsv.exe 3468 spoolsv.exe 1128 spoolsv.exe 456 spoolsv.exe 8 spoolsv.exe 1424 spoolsv.exe 3480 spoolsv.exe 4952 spoolsv.exe 832 spoolsv.exe 1484 spoolsv.exe 4588 spoolsv.exe 3064 spoolsv.exe 4568 spoolsv.exe 1260 spoolsv.exe 3904 spoolsv.exe 4656 spoolsv.exe 3168 spoolsv.exe 3448 spoolsv.exe 3688 spoolsv.exe 4396 spoolsv.exe 3000 spoolsv.exe 4988 spoolsv.exe 960 spoolsv.exe 4424 spoolsv.exe 3044 spoolsv.exe 4204 spoolsv.exe 4792 spoolsv.exe 2988 spoolsv.exe 4372 spoolsv.exe 1408 explorer.exe 5064 spoolsv.exe 3732 spoolsv.exe 964 spoolsv.exe 5028 spoolsv.exe 2624 spoolsv.exe 1396 explorer.exe 1044 spoolsv.exe 4812 spoolsv.exe 4592 spoolsv.exe 2052 spoolsv.exe 3132 spoolsv.exe 4956 spoolsv.exe 4248 spoolsv.exe 828 spoolsv.exe 4440 explorer.exe 936 spoolsv.exe 3568 spoolsv.exe 2012 spoolsv.exe 4684 spoolsv.exe 4984 explorer.exe 3380 spoolsv.exe 1504 spoolsv.exe 3140 spoolsv.exe 4632 spoolsv.exe 4296 explorer.exe 2004 spoolsv.exe 3596 spoolsv.exe 3500 spoolsv.exe 4892 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 42 IoCs
Processes:
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exedescription pid process target process PID 1412 set thread context of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 264 set thread context of 1440 264 explorer.exe explorer.exe PID 2200 set thread context of 4372 2200 spoolsv.exe spoolsv.exe PID 932 set thread context of 5064 932 spoolsv.exe spoolsv.exe PID 3848 set thread context of 3732 3848 spoolsv.exe spoolsv.exe PID 2264 set thread context of 964 2264 spoolsv.exe spoolsv.exe PID 3468 set thread context of 5028 3468 spoolsv.exe spoolsv.exe PID 1128 set thread context of 2624 1128 spoolsv.exe spoolsv.exe PID 456 set thread context of 4812 456 spoolsv.exe spoolsv.exe PID 8 set thread context of 4592 8 spoolsv.exe spoolsv.exe PID 1424 set thread context of 2052 1424 spoolsv.exe spoolsv.exe PID 3480 set thread context of 3132 3480 spoolsv.exe spoolsv.exe PID 4952 set thread context of 4956 4952 spoolsv.exe spoolsv.exe PID 832 set thread context of 828 832 spoolsv.exe spoolsv.exe PID 1484 set thread context of 936 1484 spoolsv.exe spoolsv.exe PID 4588 set thread context of 3568 4588 spoolsv.exe spoolsv.exe PID 3064 set thread context of 4684 3064 spoolsv.exe spoolsv.exe PID 4568 set thread context of 3380 4568 spoolsv.exe spoolsv.exe PID 1260 set thread context of 1504 1260 spoolsv.exe spoolsv.exe PID 3904 set thread context of 4632 3904 spoolsv.exe spoolsv.exe PID 4656 set thread context of 2004 4656 spoolsv.exe spoolsv.exe PID 3168 set thread context of 3500 3168 spoolsv.exe spoolsv.exe PID 3448 set thread context of 4892 3448 spoolsv.exe spoolsv.exe PID 3688 set thread context of 1148 3688 spoolsv.exe spoolsv.exe PID 4396 set thread context of 4308 4396 spoolsv.exe spoolsv.exe PID 3000 set thread context of 2580 3000 spoolsv.exe spoolsv.exe PID 4988 set thread context of 2636 4988 spoolsv.exe spoolsv.exe PID 960 set thread context of 2144 960 spoolsv.exe spoolsv.exe PID 4424 set thread context of 556 4424 spoolsv.exe spoolsv.exe PID 3044 set thread context of 1468 3044 spoolsv.exe spoolsv.exe PID 4204 set thread context of 4284 4204 spoolsv.exe spoolsv.exe PID 4792 set thread context of 3724 4792 spoolsv.exe spoolsv.exe PID 1408 set thread context of 4072 1408 explorer.exe explorer.exe PID 2988 set thread context of 2800 2988 spoolsv.exe spoolsv.exe PID 1044 set thread context of 3840 1044 spoolsv.exe spoolsv.exe PID 1396 set thread context of 4680 1396 explorer.exe explorer.exe PID 4248 set thread context of 3148 4248 spoolsv.exe spoolsv.exe PID 4440 set thread context of 4384 4440 explorer.exe explorer.exe PID 2012 set thread context of 3376 2012 spoolsv.exe spoolsv.exe PID 4984 set thread context of 4456 4984 explorer.exe explorer.exe PID 3140 set thread context of 5084 3140 spoolsv.exe spoolsv.exe PID 4296 set thread context of 672 4296 explorer.exe explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exe6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exeexplorer.exepid process 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1440 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 1440 explorer.exe 4372 spoolsv.exe 4372 spoolsv.exe 5064 spoolsv.exe 5064 spoolsv.exe 3732 spoolsv.exe 3732 spoolsv.exe 964 spoolsv.exe 964 spoolsv.exe 5028 spoolsv.exe 5028 spoolsv.exe 2624 spoolsv.exe 2624 spoolsv.exe 4812 spoolsv.exe 4812 spoolsv.exe 4592 spoolsv.exe 4592 spoolsv.exe 2052 spoolsv.exe 2052 spoolsv.exe 3132 spoolsv.exe 3132 spoolsv.exe 4956 spoolsv.exe 4956 spoolsv.exe 828 spoolsv.exe 828 spoolsv.exe 936 spoolsv.exe 936 spoolsv.exe 3568 spoolsv.exe 3568 spoolsv.exe 4684 spoolsv.exe 4684 spoolsv.exe 3380 spoolsv.exe 3380 spoolsv.exe 1504 spoolsv.exe 1504 spoolsv.exe 4632 spoolsv.exe 4632 spoolsv.exe 2004 spoolsv.exe 2004 spoolsv.exe 3500 spoolsv.exe 3500 spoolsv.exe 4892 spoolsv.exe 4892 spoolsv.exe 1148 spoolsv.exe 1148 spoolsv.exe 4308 spoolsv.exe 4308 spoolsv.exe 2580 spoolsv.exe 2580 spoolsv.exe 2636 spoolsv.exe 2636 spoolsv.exe 2144 spoolsv.exe 2144 spoolsv.exe 556 spoolsv.exe 556 spoolsv.exe 1468 spoolsv.exe 1468 spoolsv.exe 4284 spoolsv.exe 4284 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 1412 wrote to memory of 1972 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe splwow64.exe PID 1412 wrote to memory of 1972 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe splwow64.exe PID 1412 wrote to memory of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 1412 wrote to memory of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 1412 wrote to memory of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 1412 wrote to memory of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 1412 wrote to memory of 1084 1412 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe PID 1084 wrote to memory of 264 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe explorer.exe PID 1084 wrote to memory of 264 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe explorer.exe PID 1084 wrote to memory of 264 1084 6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe explorer.exe PID 264 wrote to memory of 1440 264 explorer.exe explorer.exe PID 264 wrote to memory of 1440 264 explorer.exe explorer.exe PID 264 wrote to memory of 1440 264 explorer.exe explorer.exe PID 264 wrote to memory of 1440 264 explorer.exe explorer.exe PID 264 wrote to memory of 1440 264 explorer.exe explorer.exe PID 1440 wrote to memory of 2200 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 2200 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 2200 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 932 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 932 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 932 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3848 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3848 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3848 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 2264 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 2264 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 2264 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3468 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3468 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3468 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1128 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1128 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1128 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 456 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 456 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 456 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 8 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 8 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 8 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1424 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1424 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1424 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3480 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3480 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3480 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4952 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4952 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4952 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 832 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 832 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 832 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1484 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1484 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1484 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4588 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4588 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4588 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3064 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3064 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 3064 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4568 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4568 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 4568 1440 explorer.exe spoolsv.exe PID 1440 wrote to memory of 1260 1440 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Users\Admin\AppData\Local\Temp\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f0247bae5f3fc2b6ec644ef5a5a2907_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Parameters.iniFilesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
C:\Windows\System\explorer.exeFilesize
2.2MB
MD5763adc9a5b027a90fc27ae1e6a571110
SHA1b09892a87141a4aa0e86f1ef5857510c2a945aae
SHA256349dcf94d942e9a1f9ec42a1cb0962d0b57015c81b469dd0fdcc08054f03851d
SHA51289e822883251201c3add7752163e8c49fa1afebe2554364a7c25fe8471ddedd83e40e41b1ee55eedd53956053151d94f4df26ee5af6e65e0b66953439a0fc0c4
-
C:\Windows\System\spoolsv.exeFilesize
2.2MB
MD5adc30f0af8dce68ba633281b5b988c68
SHA1ad408a359b351c1a2499ed523124a2736c6edb63
SHA256445748ee74f5e2bd12910af6da906ed31e5f6e619dca6a4a9ca4bb5497521fba
SHA5122adae19981159ec77467c367a16408fd07f7a669ab4a4396c9423ff2d17ea9e83ee4c04440903ecc0c2a5c4c8db4070397b07b7110c52e1c6383a78af463b09c
-
memory/8-1435-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/264-85-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/264-89-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/456-1260-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/556-3212-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/672-4653-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/828-2480-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/828-2563-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/832-1596-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/932-1116-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/932-2109-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/936-2487-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/964-2130-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1084-77-0x0000000000440000-0x0000000000509000-memory.dmpFilesize
804KB
-
memory/1084-79-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1084-47-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1084-44-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1128-1259-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1148-2950-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1260-1962-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1412-0-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/1412-46-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1412-43-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/1412-41-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1424-1436-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1440-929-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1440-91-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1484-1597-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1504-2663-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2052-2350-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2144-3202-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2200-930-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2200-2094-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2264-1118-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2280-5319-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2280-5555-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2580-3276-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2580-3097-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2624-2451-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2636-3121-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3064-1782-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3068-5342-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3132-2360-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3148-4404-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3148-4289-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3168-2098-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3376-4489-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3376-4622-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3380-2632-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3380-2628-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3448-2108-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3468-1258-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3480-1437-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3500-2885-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3568-2496-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3688-2120-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3724-3460-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3732-2117-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3840-4140-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/3848-1117-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3848-2121-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3904-1963-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3980-5538-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4016-4777-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4016-4926-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4072-3766-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4284-3231-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4372-2099-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4372-2208-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4384-4297-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4456-4500-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4568-1783-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/4588-1781-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/4592-2340-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4632-2924-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4632-2778-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4656-2097-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/4680-4148-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4684-2622-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4812-2329-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4812-2327-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4892-3069-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4892-2942-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/4952-1595-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/4956-2372-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5064-2106-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5084-4643-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5228-4873-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5284-5356-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5348-5364-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5472-5617-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5504-5374-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5572-5607-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5572-5724-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5668-5398-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5744-5408-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5844-5414-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5884-5154-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5884-5016-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5916-5423-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5916-5427-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/6052-5310-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB