Analysis
-
max time kernel
123s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 04:41
Behavioral task
behavioral1
Sample
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe
Resource
win7-20240215-en
General
-
Target
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe
-
Size
2.2MB
-
MD5
6dd9dcbe4c4d68bc9c6e7bf2305d750b
-
SHA1
067a02719cc89ccfdde95593cc3bf79583a9974a
-
SHA256
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d
-
SHA512
729a5e5621fc17e9dff91547b1fb5273d6e72535da522b8c6c675352dd75eff4f329ed7ece5702782e04e2e693163cca2b7dd9d42f282ceae658d6f499efac13
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZY:0UzeyQMS4DqodCnoe+iitjWwwE
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe -
Executes dropped EXE 25 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exepid process 1796 explorer.exe 2492 explorer.exe 2628 spoolsv.exe 1740 spoolsv.exe 3488 spoolsv.exe 2888 spoolsv.exe 4020 spoolsv.exe 1212 spoolsv.exe 3276 spoolsv.exe 4432 spoolsv.exe 2448 spoolsv.exe 1988 spoolsv.exe 2696 spoolsv.exe 1336 spoolsv.exe 948 spoolsv.exe 4840 spoolsv.exe 3012 explorer.exe 4272 spoolsv.exe 4848 spoolsv.exe 2728 spoolsv.exe 2040 spoolsv.exe 412 explorer.exe 2416 spoolsv.exe 5016 spoolsv.exe 3332 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 3508 set thread context of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 2628 set thread context of 4840 2628 spoolsv.exe spoolsv.exe PID 1740 set thread context of 4848 1740 spoolsv.exe spoolsv.exe PID 3488 set thread context of 2040 3488 spoolsv.exe spoolsv.exe PID 2888 set thread context of 5016 2888 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 22 IoCs
Processes:
spoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exeexplorer.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exeexplorer.exepid process 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 4840 spoolsv.exe 4840 spoolsv.exe 4848 spoolsv.exe 4848 spoolsv.exe 2040 spoolsv.exe 2040 spoolsv.exe 5016 spoolsv.exe 5016 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 3508 wrote to memory of 1088 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe splwow64.exe PID 3508 wrote to memory of 1088 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe splwow64.exe PID 3508 wrote to memory of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 3508 wrote to memory of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 3508 wrote to memory of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 3508 wrote to memory of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 3508 wrote to memory of 5112 3508 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe PID 5112 wrote to memory of 1796 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe explorer.exe PID 5112 wrote to memory of 1796 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe explorer.exe PID 5112 wrote to memory of 1796 5112 1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe explorer.exe PID 2492 wrote to memory of 2628 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2628 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2628 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1740 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1740 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1740 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3488 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3488 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3488 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2888 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2888 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2888 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4020 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4020 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4020 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1212 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1212 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1212 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3276 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3276 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 3276 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4432 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4432 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4432 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2448 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2448 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2448 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1988 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1988 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1988 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2696 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2696 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 2696 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1336 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1336 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 1336 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 948 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 948 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 948 2492 explorer.exe spoolsv.exe PID 2628 wrote to memory of 4840 2628 spoolsv.exe spoolsv.exe PID 2628 wrote to memory of 4840 2628 spoolsv.exe spoolsv.exe PID 2628 wrote to memory of 4840 2628 spoolsv.exe spoolsv.exe PID 2628 wrote to memory of 4840 2628 spoolsv.exe spoolsv.exe PID 2628 wrote to memory of 4840 2628 spoolsv.exe spoolsv.exe PID 4840 wrote to memory of 3012 4840 spoolsv.exe explorer.exe PID 4840 wrote to memory of 3012 4840 spoolsv.exe explorer.exe PID 4840 wrote to memory of 3012 4840 spoolsv.exe explorer.exe PID 2492 wrote to memory of 4272 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4272 2492 explorer.exe spoolsv.exe PID 2492 wrote to memory of 4272 2492 explorer.exe spoolsv.exe PID 1740 wrote to memory of 4848 1740 spoolsv.exe spoolsv.exe PID 1740 wrote to memory of 4848 1740 spoolsv.exe spoolsv.exe PID 1740 wrote to memory of 4848 1740 spoolsv.exe spoolsv.exe PID 1740 wrote to memory of 4848 1740 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe"C:\Users\Admin\AppData\Local\Temp\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe"C:\Users\Admin\AppData\Local\Temp\1f6a91b673fd592947391ab6306589c048b58a6527d0ff045b94756a3d3b733d.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
PID:1796 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3012 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3020
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3488 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:412 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3148
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2888 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4480
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2992
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2788
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3276 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4672
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3116
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4344
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1064
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:456
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1796
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2696 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1040
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1480
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3028
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1912
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3892
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3600
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:3332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2316
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1472
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1580
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1408
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2784
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4028
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1652
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1488
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4496
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3272
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1352 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5966080b9de7fb6f21a49ee5b83960ba8
SHA1e27e1552c408171bf6e2ebaf2eeee16603b73908
SHA2560734381706d7c17cd75dd99650f21327e7f46180e52d8aca1dc9dba937abf64f
SHA512cab0fecd4f0c9a1b0a0a8d9eba538c0f143d6126effcbe0219ad12e2417eb72ae4e073a8456150a0f8fafbafee35b69c7037e8dbf13f252b119e1cdfc4a2bd69
-
Filesize
2.2MB
MD53fa15f44f064f011f7c612aa30f2f985
SHA1cf1956774ad7a31b1554328cab9e1d529ab3f3c5
SHA256af5785779c25f6c5c5cad8d7146fdf78589366811bc9799f62ae0204b71e8013
SHA51208f8d9a92911ca19c9472b8f66de03ae080f145ace8c6e481d1adfb5874c1dd2c42df415f911aae28c55a9f6c520774292773b7af93c752731d484ec254c5cb3