Analysis
-
max time kernel
107s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 09:14
Behavioral task
behavioral1
Sample
71807070c90005668311b886d095a742_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
71807070c90005668311b886d095a742_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
71807070c90005668311b886d095a742
-
SHA1
348a47c7cdb228f882e17b3e7369fdeb7a37204e
-
SHA256
1cfe2488e5f3c1e493ccabff6d635c850f1a680aafd7e471c15dbfea4ff86ffe
-
SHA512
4c40416b8a9a797ec656da548d4bbb7a30da1497483e95c41ff86a9ac47fb0bf3d00716c3e3b954a03df6dd4f94618d5ddbe20f88e4585c3c002f5cef3a5fff9
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZy:0UzeyQMS4DqodCnoe+iitjWwwm
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
71807070c90005668311b886d095a742_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe -
Executes dropped EXE 22 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exepid process 996 explorer.exe 1640 explorer.exe 2172 spoolsv.exe 3712 spoolsv.exe 3964 spoolsv.exe 3628 spoolsv.exe 4468 spoolsv.exe 4748 spoolsv.exe 4600 spoolsv.exe 4416 spoolsv.exe 4348 spoolsv.exe 4752 spoolsv.exe 2592 spoolsv.exe 4500 spoolsv.exe 4312 spoolsv.exe 4292 spoolsv.exe 2284 spoolsv.exe 1764 explorer.exe 4656 spoolsv.exe 4388 spoolsv.exe 3400 explorer.exe 2912 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exedescription pid process target process PID 636 set thread context of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 996 set thread context of 1640 996 explorer.exe explorer.exe PID 2172 set thread context of 2284 2172 spoolsv.exe spoolsv.exe PID 3712 set thread context of 4388 3712 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 21 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exe71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 71807070c90005668311b886d095a742_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exepid process 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exepid process 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 1640 explorer.exe 2284 spoolsv.exe 2284 spoolsv.exe 4388 spoolsv.exe 4388 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71807070c90005668311b886d095a742_JaffaCakes118.exe71807070c90005668311b886d095a742_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exedescription pid process target process PID 636 wrote to memory of 2220 636 71807070c90005668311b886d095a742_JaffaCakes118.exe splwow64.exe PID 636 wrote to memory of 2220 636 71807070c90005668311b886d095a742_JaffaCakes118.exe splwow64.exe PID 636 wrote to memory of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 636 wrote to memory of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 636 wrote to memory of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 636 wrote to memory of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 636 wrote to memory of 2984 636 71807070c90005668311b886d095a742_JaffaCakes118.exe 71807070c90005668311b886d095a742_JaffaCakes118.exe PID 2984 wrote to memory of 996 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe explorer.exe PID 2984 wrote to memory of 996 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe explorer.exe PID 2984 wrote to memory of 996 2984 71807070c90005668311b886d095a742_JaffaCakes118.exe explorer.exe PID 996 wrote to memory of 1640 996 explorer.exe explorer.exe PID 996 wrote to memory of 1640 996 explorer.exe explorer.exe PID 996 wrote to memory of 1640 996 explorer.exe explorer.exe PID 996 wrote to memory of 1640 996 explorer.exe explorer.exe PID 996 wrote to memory of 1640 996 explorer.exe explorer.exe PID 1640 wrote to memory of 2172 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 2172 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 2172 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3712 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3712 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3712 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3964 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3964 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3964 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3628 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3628 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 3628 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4468 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4468 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4468 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4748 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4748 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4748 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4600 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4600 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4600 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4416 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4416 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4416 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4348 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4348 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4348 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4752 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4752 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4752 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 2592 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 2592 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 2592 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4500 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4500 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4500 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4312 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4312 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4312 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4292 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4292 1640 explorer.exe spoolsv.exe PID 1640 wrote to memory of 4292 1640 explorer.exe spoolsv.exe PID 2172 wrote to memory of 2284 2172 spoolsv.exe spoolsv.exe PID 2172 wrote to memory of 2284 2172 spoolsv.exe spoolsv.exe PID 2172 wrote to memory of 2284 2172 spoolsv.exe spoolsv.exe PID 2172 wrote to memory of 2284 2172 spoolsv.exe spoolsv.exe PID 2172 wrote to memory of 2284 2172 spoolsv.exe spoolsv.exe PID 2284 wrote to memory of 1764 2284 spoolsv.exe explorer.exe PID 2284 wrote to memory of 1764 2284 spoolsv.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71807070c90005668311b886d095a742_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71807070c90005668311b886d095a742_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\71807070c90005668311b886d095a742_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71807070c90005668311b886d095a742_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1764 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4728
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3712 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
PID:3400 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3460
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3964 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2208
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2764
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4596
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4748 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:844
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1972
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4956
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4100
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4480
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2304
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2280
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3684
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4500 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1200
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3876
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2440
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3356
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1544
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4340
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2228
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1548
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4040
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3480
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1916
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4300
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2740
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4520
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4344
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1184
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4616
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1216
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:440
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:624
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1688
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4340 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD55f607585e2bbea00f7b3594aa5af49ba
SHA10ccfc21a6df0a76328dce8aec06f304b9cc76a63
SHA2563e5695ea0a190e80d06cd4366879216cc4293af077af2ded8d74cdc969182b47
SHA5127fb789e839aa03d2f86cf287e0ac6037eee08723ed710fd6a04dd6fdf736015dbc2dfded76b9c8646e35e98b4981c261f655630e0986058142a04e84a011309c
-
Filesize
2.2MB
MD55dd8a9a12341b03114b9f608133e796b
SHA151a52cee5836d9baea2406a9ceb9cbad3000061a
SHA256b3e2bbb884c06603b90aa8d25923292a71fecc9e19abca1e573f3049abdc76f6
SHA512e7d3b45b8bab2921e629a8dc5ff3e58186133c00e443bb9b60d6afdae8c00cc57589cf5a1d0b761f3a7682b27be3a8a0ae6ff0b9eef89bc780e3934cae0c912d