Analysis
-
max time kernel
113s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 01:08
Behavioral task
behavioral1
Sample
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
7b30a84d4fb6a1167da41faa91acee47
-
SHA1
d9a1d2f7ed533179af063e8a148fc2656f5e363a
-
SHA256
66314f1788b6ed95b9d319b18b7ce73fd88e950bbb4b21fbd4087554edcee1e0
-
SHA512
2e6063f8381b63f9fab5394c402136b218161fa4824269702a26e168c343c197a3686e913de07e3f403ec8122559c09639d7f5fca9cca4602b3f971c775aa4f8
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ8:0UzeyQMS4DqodCnoe+iitjWwwo
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe -
Executes dropped EXE 22 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exepid process 4208 explorer.exe 1636 explorer.exe 1648 spoolsv.exe 2448 spoolsv.exe 556 spoolsv.exe 4080 spoolsv.exe 1908 spoolsv.exe 4480 spoolsv.exe 940 spoolsv.exe 4168 spoolsv.exe 4464 spoolsv.exe 4612 spoolsv.exe 1416 spoolsv.exe 2816 spoolsv.exe 2236 spoolsv.exe 5056 spoolsv.exe 4272 spoolsv.exe 3084 spoolsv.exe 1140 spoolsv.exe 2352 explorer.exe 2628 spoolsv.exe 552 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exedescription pid process target process PID 5112 set thread context of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 4208 set thread context of 1636 4208 explorer.exe explorer.exe PID 1648 set thread context of 1140 1648 spoolsv.exe spoolsv.exe PID 2448 set thread context of 552 2448 spoolsv.exe spoolsv.exe -
Drops file in Windows directory 22 IoCs
Processes:
spoolsv.exespoolsv.exespoolsv.exe7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exepid process 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exespoolsv.exespoolsv.exepid process 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1140 spoolsv.exe 1140 spoolsv.exe 552 spoolsv.exe 552 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exeexplorer.exeexplorer.exespoolsv.exedescription pid process target process PID 5112 wrote to memory of 4584 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe splwow64.exe PID 5112 wrote to memory of 4584 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe splwow64.exe PID 5112 wrote to memory of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 5112 wrote to memory of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 5112 wrote to memory of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 5112 wrote to memory of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 5112 wrote to memory of 3164 5112 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe PID 3164 wrote to memory of 4208 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe explorer.exe PID 3164 wrote to memory of 4208 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe explorer.exe PID 3164 wrote to memory of 4208 3164 7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe explorer.exe PID 4208 wrote to memory of 1636 4208 explorer.exe explorer.exe PID 4208 wrote to memory of 1636 4208 explorer.exe explorer.exe PID 4208 wrote to memory of 1636 4208 explorer.exe explorer.exe PID 4208 wrote to memory of 1636 4208 explorer.exe explorer.exe PID 4208 wrote to memory of 1636 4208 explorer.exe explorer.exe PID 1636 wrote to memory of 1648 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1648 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1648 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2448 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2448 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2448 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 556 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 556 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 556 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4080 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4080 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4080 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1908 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1908 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1908 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4480 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4480 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4480 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 940 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 940 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 940 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4168 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4168 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4168 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4464 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4464 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4464 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4612 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4612 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4612 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1416 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1416 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 1416 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2816 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2816 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2816 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2236 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2236 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 2236 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 5056 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 5056 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 5056 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4272 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4272 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 4272 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 3084 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 3084 1636 explorer.exe spoolsv.exe PID 1636 wrote to memory of 3084 1636 explorer.exe spoolsv.exe PID 1648 wrote to memory of 1140 1648 spoolsv.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7b30a84d4fb6a1167da41faa91acee47_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2352 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4076
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3472
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3784
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:648
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:852
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2268
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3880
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3176
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3112
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4388
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4512
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4660
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4648
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3128
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1708
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4072
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5084
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3968
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4468
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4936
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:396
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5116
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2648
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4904
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1608
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4992
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3264
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1556
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5beecba89c22aae965b38e4ef215f08f3
SHA12d501b2e7f447dfef4abe4c82c7d88058ca8a144
SHA2562387b6af4fdb60e4105182be31758ee50a0b492f7a4d8a74a44ab65b541c2aca
SHA512a200e46dbeeebdf685d9462b6e6db8b6911f0bff04f2e5caebb9797639aa86e64fd0ad475c46043d1b13fca42c12f4d8fa5bbe6cf1e4a6292c25299a12292f94
-
Filesize
2.2MB
MD5220a43322c2b8ea11d03a88064d11b55
SHA1b9631abf27a9a848471d0bfde673b9ca1ee1764a
SHA256774e8495d2485c01a1882425a5988e4360a2550b2880cf46130c67b62a42e372
SHA5128b038d98681602b2c07a06eef130b8219530f05795ad782fe2829fb324a5ebca8c7a84a9438b5567a43af6ee7583db661ae3f75adc84a7b1bac6079785a73ad3