Analysis
-
max time kernel
131s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:42
Behavioral task
behavioral1
Sample
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
74a123b57e148e9c13dc171b7fb50a32
-
SHA1
12aa2bf0d5783d30caccd202eda50c734297dbc7
-
SHA256
642217f633ee9d8e762461366a6a4e8e3375033a37fc4d2fdf1a6594860a4570
-
SHA512
8d4ed2ca7bdb908e05be982a6b09017928ac724fc4a91dabbcdcec1806be4003882dac49ca383e32711f175e10e7a67513f6618a0feab7a36a5816a8f80b0a24
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZz:0UzeyQMS4DqodCnoe+iitjWwwP
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exepid process 4600 explorer.exe 4904 explorer.exe 4160 spoolsv.exe 1500 spoolsv.exe 4364 spoolsv.exe 2520 spoolsv.exe 4380 spoolsv.exe 4180 spoolsv.exe 4212 spoolsv.exe 3120 spoolsv.exe 1208 spoolsv.exe 4524 spoolsv.exe 4596 spoolsv.exe 4776 spoolsv.exe 2184 spoolsv.exe 4880 spoolsv.exe 4856 spoolsv.exe 632 spoolsv.exe 3620 spoolsv.exe 4460 spoolsv.exe 1244 spoolsv.exe 764 spoolsv.exe 1440 spoolsv.exe 4412 spoolsv.exe 2440 spoolsv.exe 4296 spoolsv.exe 4868 spoolsv.exe 5032 spoolsv.exe 3132 spoolsv.exe 3076 spoolsv.exe 4672 spoolsv.exe 3472 spoolsv.exe 1524 explorer.exe 916 spoolsv.exe 2672 spoolsv.exe 3048 spoolsv.exe 2916 spoolsv.exe 1376 spoolsv.exe 4388 spoolsv.exe 3464 explorer.exe 4788 spoolsv.exe 2140 spoolsv.exe 3232 spoolsv.exe 2032 spoolsv.exe 2324 explorer.exe 1724 spoolsv.exe 2800 spoolsv.exe 4320 spoolsv.exe 1892 spoolsv.exe 1008 spoolsv.exe 1744 explorer.exe 2304 spoolsv.exe 4416 spoolsv.exe 2552 spoolsv.exe 3452 spoolsv.exe 220 explorer.exe 1520 spoolsv.exe 1128 spoolsv.exe 4256 spoolsv.exe 2012 spoolsv.exe 3980 explorer.exe 2900 spoolsv.exe 4028 spoolsv.exe 1672 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 42 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exedescription pid process target process PID 2540 set thread context of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 4600 set thread context of 4904 4600 explorer.exe explorer.exe PID 4160 set thread context of 3472 4160 spoolsv.exe spoolsv.exe PID 1500 set thread context of 916 1500 spoolsv.exe spoolsv.exe PID 4364 set thread context of 2672 4364 spoolsv.exe spoolsv.exe PID 2520 set thread context of 3048 2520 spoolsv.exe spoolsv.exe PID 4380 set thread context of 1376 4380 spoolsv.exe spoolsv.exe PID 4180 set thread context of 4388 4180 spoolsv.exe spoolsv.exe PID 4212 set thread context of 4788 4212 spoolsv.exe spoolsv.exe PID 3120 set thread context of 2140 3120 spoolsv.exe spoolsv.exe PID 1208 set thread context of 2032 1208 spoolsv.exe spoolsv.exe PID 4524 set thread context of 1724 4524 spoolsv.exe spoolsv.exe PID 4596 set thread context of 2800 4596 spoolsv.exe spoolsv.exe PID 4776 set thread context of 4320 4776 spoolsv.exe spoolsv.exe PID 2184 set thread context of 1008 2184 spoolsv.exe spoolsv.exe PID 4880 set thread context of 2304 4880 spoolsv.exe spoolsv.exe PID 4856 set thread context of 2552 4856 spoolsv.exe spoolsv.exe PID 632 set thread context of 3452 632 spoolsv.exe spoolsv.exe PID 3620 set thread context of 1520 3620 spoolsv.exe spoolsv.exe PID 4460 set thread context of 4256 4460 spoolsv.exe spoolsv.exe PID 1244 set thread context of 2012 1244 spoolsv.exe spoolsv.exe PID 764 set thread context of 2900 764 spoolsv.exe spoolsv.exe PID 1440 set thread context of 1672 1440 spoolsv.exe spoolsv.exe PID 4412 set thread context of 3508 4412 spoolsv.exe spoolsv.exe PID 2440 set thread context of 468 2440 spoolsv.exe spoolsv.exe PID 4296 set thread context of 5076 4296 spoolsv.exe spoolsv.exe PID 4868 set thread context of 4796 4868 spoolsv.exe spoolsv.exe PID 5032 set thread context of 1068 5032 spoolsv.exe spoolsv.exe PID 3132 set thread context of 2684 3132 spoolsv.exe spoolsv.exe PID 3076 set thread context of 4040 3076 spoolsv.exe spoolsv.exe PID 4672 set thread context of 3880 4672 spoolsv.exe spoolsv.exe PID 1524 set thread context of 464 1524 explorer.exe explorer.exe PID 2916 set thread context of 2432 2916 spoolsv.exe spoolsv.exe PID 3464 set thread context of 4804 3464 explorer.exe explorer.exe PID 3232 set thread context of 2152 3232 spoolsv.exe spoolsv.exe PID 2324 set thread context of 3740 2324 explorer.exe explorer.exe PID 1892 set thread context of 3748 1892 spoolsv.exe spoolsv.exe PID 1744 set thread context of 2676 1744 explorer.exe explorer.exe PID 4416 set thread context of 2368 4416 spoolsv.exe spoolsv.exe PID 220 set thread context of 772 220 explorer.exe explorer.exe PID 1128 set thread context of 1452 1128 spoolsv.exe spoolsv.exe PID 3980 set thread context of 4332 3980 explorer.exe explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exeexplorer.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exe74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exepid process 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4904 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 4904 explorer.exe 3472 spoolsv.exe 3472 spoolsv.exe 916 spoolsv.exe 916 spoolsv.exe 2672 spoolsv.exe 2672 spoolsv.exe 3048 spoolsv.exe 3048 spoolsv.exe 1376 spoolsv.exe 1376 spoolsv.exe 4388 spoolsv.exe 4388 spoolsv.exe 4788 spoolsv.exe 4788 spoolsv.exe 2140 spoolsv.exe 2140 spoolsv.exe 2032 spoolsv.exe 2032 spoolsv.exe 1724 spoolsv.exe 1724 spoolsv.exe 2800 spoolsv.exe 2800 spoolsv.exe 4320 spoolsv.exe 4320 spoolsv.exe 1008 spoolsv.exe 1008 spoolsv.exe 2304 spoolsv.exe 2304 spoolsv.exe 2552 spoolsv.exe 2552 spoolsv.exe 3452 spoolsv.exe 3452 spoolsv.exe 1520 spoolsv.exe 1520 spoolsv.exe 4256 spoolsv.exe 4256 spoolsv.exe 2012 spoolsv.exe 2012 spoolsv.exe 2900 spoolsv.exe 2900 spoolsv.exe 1672 spoolsv.exe 1672 spoolsv.exe 3508 spoolsv.exe 3508 spoolsv.exe 468 spoolsv.exe 468 spoolsv.exe 5076 spoolsv.exe 5076 spoolsv.exe 4796 spoolsv.exe 4796 spoolsv.exe 1068 spoolsv.exe 1068 spoolsv.exe 2684 spoolsv.exe 2684 spoolsv.exe 4040 spoolsv.exe 4040 spoolsv.exe 3880 spoolsv.exe 3880 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 2540 wrote to memory of 4760 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe splwow64.exe PID 2540 wrote to memory of 4760 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe splwow64.exe PID 2540 wrote to memory of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 2540 wrote to memory of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 2540 wrote to memory of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 2540 wrote to memory of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 2540 wrote to memory of 4316 2540 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe PID 4316 wrote to memory of 4600 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe explorer.exe PID 4316 wrote to memory of 4600 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe explorer.exe PID 4316 wrote to memory of 4600 4316 74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe explorer.exe PID 4600 wrote to memory of 4904 4600 explorer.exe explorer.exe PID 4600 wrote to memory of 4904 4600 explorer.exe explorer.exe PID 4600 wrote to memory of 4904 4600 explorer.exe explorer.exe PID 4600 wrote to memory of 4904 4600 explorer.exe explorer.exe PID 4600 wrote to memory of 4904 4600 explorer.exe explorer.exe PID 4904 wrote to memory of 4160 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4160 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4160 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1500 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1500 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1500 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4364 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4364 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4364 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2520 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2520 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2520 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4380 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4380 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4380 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4180 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4180 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4180 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4212 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4212 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4212 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 3120 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 3120 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 3120 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1208 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1208 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 1208 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4524 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4524 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4524 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4596 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4596 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4596 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4776 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4776 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4776 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2184 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2184 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 2184 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4880 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4880 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4880 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4856 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4856 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 4856 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 632 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 632 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 632 4904 explorer.exe spoolsv.exe PID 4904 wrote to memory of 3620 4904 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74a123b57e148e9c13dc171b7fb50a32_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3472 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1524 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:464
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1500 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2520 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3464 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4804
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3120 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2324 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3740
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2184 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1744 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2676
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3452 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:220 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:772
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4256
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3980 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4332
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:764 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3508 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2396
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2292
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:468
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4296 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4868 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4796 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3172 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:912
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3880 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1984 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1976
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2432
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2232 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2532
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2152
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1364
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2368
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4136
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4376
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1944
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3628
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4712 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2548
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4960
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1932
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3404
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3560
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4000 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:32 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2096
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1652 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1668
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3276
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1592
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4288
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3144
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1396
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4276
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4848
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3368
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4004
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1112
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD548684bea1e34c0e03fef9e5c3a5c1433
SHA123a5a89da781850e3ddfb9e066cdb304fce387ab
SHA2564822de3da2133639521f0c337eecccc4feaffdcd6f73501094290ce348ded968
SHA512aed382c29638c0f3109caeafb7d5a4430d5504469a1f83cac1d84d2e4688afa2b7ec68bc1891a75deb485e4ae0d68bf8cb4f8c0cf966b215c1a3361f369c999d
-
Filesize
2.2MB
MD5ebba9ced324cca24bc651ec6c121654e
SHA18b459a83a68c3f359d70d0dc795e7dfa835c64f9
SHA256575ccf4ad0f788667365efa47ed01ac7426a370fba650fdcb280065ff6114708
SHA512f7f32d952136c90855924d8d93167b51072afcbc6807c2341981839e5998b199bb559e39aaf1aa4b1d65b3645d38a07d23bd37ba7af6b127c6c1959b8345435e