Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 23:12
Behavioral task
behavioral1
Sample
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
59df785459bc5dcc17fa1b741d82b638
-
SHA1
37a50d6bf1888eccfea244986b3089af586d6d0b
-
SHA256
5f44953bd9542ef3a40f74fdfd73849e16c8d5f2fa69b6ecf14244669b6937aa
-
SHA512
e99d994f01117a8fdfa29c114ac5f04835a4964b5bcbc97835c90f6af2e400ba4b90c9aa2d56df90e2865fb3602ffac39e7ba4a068fd2edd7d9a6eb7209ca7cd
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZV:0UzeyQMS4DqodCnoe+iitjWwwR
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exepid process 2488 explorer.exe 1748 explorer.exe 3644 spoolsv.exe 2216 spoolsv.exe 2288 spoolsv.exe 4464 spoolsv.exe 4604 spoolsv.exe 2368 spoolsv.exe 2484 spoolsv.exe 2092 spoolsv.exe 1020 spoolsv.exe 4168 spoolsv.exe 4552 spoolsv.exe 2896 spoolsv.exe 884 spoolsv.exe 1080 spoolsv.exe 624 spoolsv.exe 3084 spoolsv.exe 60 spoolsv.exe 4644 spoolsv.exe 752 spoolsv.exe 944 spoolsv.exe 3856 spoolsv.exe 3732 spoolsv.exe 1364 spoolsv.exe 312 spoolsv.exe 4848 spoolsv.exe 4136 explorer.exe 1744 spoolsv.exe 4512 spoolsv.exe 1560 spoolsv.exe 3924 spoolsv.exe 3620 explorer.exe 4652 spoolsv.exe 836 spoolsv.exe 1156 spoolsv.exe 4556 spoolsv.exe 2020 spoolsv.exe 3424 spoolsv.exe 1276 explorer.exe 4268 spoolsv.exe 2196 spoolsv.exe 724 spoolsv.exe 700 explorer.exe 428 spoolsv.exe 2456 spoolsv.exe 4688 spoolsv.exe 5084 spoolsv.exe 2552 spoolsv.exe 3568 explorer.exe 1836 spoolsv.exe 1284 spoolsv.exe 2992 spoolsv.exe 3860 explorer.exe 3532 spoolsv.exe 4324 spoolsv.exe 1176 spoolsv.exe 4776 explorer.exe 3964 spoolsv.exe 3148 spoolsv.exe 2904 spoolsv.exe 1448 spoolsv.exe 3848 explorer.exe 4756 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 27 IoCs
Processes:
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exedescription pid process target process PID 2660 set thread context of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2488 set thread context of 1748 2488 explorer.exe explorer.exe PID 3644 set thread context of 4848 3644 spoolsv.exe spoolsv.exe PID 2216 set thread context of 1744 2216 spoolsv.exe spoolsv.exe PID 2288 set thread context of 4512 2288 spoolsv.exe spoolsv.exe PID 4464 set thread context of 3924 4464 spoolsv.exe spoolsv.exe PID 4604 set thread context of 4652 4604 spoolsv.exe spoolsv.exe PID 2368 set thread context of 836 2368 spoolsv.exe spoolsv.exe PID 2484 set thread context of 1156 2484 spoolsv.exe spoolsv.exe PID 2092 set thread context of 2020 2092 spoolsv.exe spoolsv.exe PID 1020 set thread context of 3424 1020 spoolsv.exe spoolsv.exe PID 4168 set thread context of 2196 4168 spoolsv.exe spoolsv.exe PID 4552 set thread context of 724 4552 spoolsv.exe spoolsv.exe PID 2896 set thread context of 2456 2896 spoolsv.exe spoolsv.exe PID 884 set thread context of 4688 884 spoolsv.exe spoolsv.exe PID 1080 set thread context of 2552 1080 spoolsv.exe spoolsv.exe PID 624 set thread context of 1836 624 spoolsv.exe spoolsv.exe PID 3084 set thread context of 2992 3084 spoolsv.exe spoolsv.exe PID 60 set thread context of 3532 60 spoolsv.exe spoolsv.exe PID 4644 set thread context of 1176 4644 spoolsv.exe spoolsv.exe PID 752 set thread context of 3964 752 spoolsv.exe spoolsv.exe PID 944 set thread context of 3148 944 spoolsv.exe spoolsv.exe PID 3856 set thread context of 1448 3856 spoolsv.exe spoolsv.exe PID 3732 set thread context of 1624 3732 spoolsv.exe spoolsv.exe PID 1364 set thread context of 3444 1364 spoolsv.exe spoolsv.exe PID 312 set thread context of 1592 312 spoolsv.exe spoolsv.exe PID 4136 set thread context of 4692 4136 explorer.exe explorer.exe -
Drops file in Windows directory 50 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exe59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exe59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exeexplorer.exepid process 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe -
Suspicious use of SetWindowsHookEx 56 IoCs
Processes:
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exeexplorer.exepid process 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 1748 explorer.exe 4848 spoolsv.exe 4848 spoolsv.exe 1744 spoolsv.exe 1744 spoolsv.exe 4512 spoolsv.exe 4512 spoolsv.exe 3924 spoolsv.exe 3924 spoolsv.exe 4652 spoolsv.exe 4652 spoolsv.exe 836 spoolsv.exe 836 spoolsv.exe 1156 spoolsv.exe 1156 spoolsv.exe 2020 spoolsv.exe 2020 spoolsv.exe 3424 spoolsv.exe 3424 spoolsv.exe 2196 spoolsv.exe 2196 spoolsv.exe 724 spoolsv.exe 724 spoolsv.exe 2456 spoolsv.exe 2456 spoolsv.exe 4688 spoolsv.exe 4688 spoolsv.exe 2552 spoolsv.exe 2552 spoolsv.exe 1836 spoolsv.exe 1836 spoolsv.exe 2992 spoolsv.exe 2992 spoolsv.exe 3532 spoolsv.exe 3532 spoolsv.exe 1176 spoolsv.exe 1176 spoolsv.exe 3964 spoolsv.exe 3964 spoolsv.exe 3148 spoolsv.exe 3148 spoolsv.exe 1448 spoolsv.exe 1448 spoolsv.exe 1624 spoolsv.exe 1624 spoolsv.exe 3444 spoolsv.exe 3444 spoolsv.exe 1592 spoolsv.exe 1592 spoolsv.exe 4692 explorer.exe 4692 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exeexplorer.exeexplorer.exedescription pid process target process PID 2660 wrote to memory of 2888 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe splwow64.exe PID 2660 wrote to memory of 2888 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe splwow64.exe PID 2660 wrote to memory of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2660 wrote to memory of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2660 wrote to memory of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2660 wrote to memory of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2660 wrote to memory of 2696 2660 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe PID 2696 wrote to memory of 2488 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe explorer.exe PID 2696 wrote to memory of 2488 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe explorer.exe PID 2696 wrote to memory of 2488 2696 59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe explorer.exe PID 2488 wrote to memory of 1748 2488 explorer.exe explorer.exe PID 2488 wrote to memory of 1748 2488 explorer.exe explorer.exe PID 2488 wrote to memory of 1748 2488 explorer.exe explorer.exe PID 2488 wrote to memory of 1748 2488 explorer.exe explorer.exe PID 2488 wrote to memory of 1748 2488 explorer.exe explorer.exe PID 1748 wrote to memory of 3644 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 3644 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 3644 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2216 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2216 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2216 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2288 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2288 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2288 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4464 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4464 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4464 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4604 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4604 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4604 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2368 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2368 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2368 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2484 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2484 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2484 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2092 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2092 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2092 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1020 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1020 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1020 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4168 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4168 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4168 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4552 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4552 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 4552 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2896 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2896 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 2896 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 884 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 884 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 884 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1080 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1080 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 1080 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 624 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 624 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 624 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 3084 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 3084 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 3084 1748 explorer.exe spoolsv.exe PID 1748 wrote to memory of 60 1748 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59df785459bc5dcc17fa1b741d82b638JaffaCakes118_NeikiAnalytics.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4136 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4512
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3924 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3620 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4940
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2368 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1276 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4516
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4168 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:724 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:700 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2856
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3568 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1168
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3860 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1112
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:60 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4776 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3812
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:944 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3848 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4280
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3732 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1592 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4672 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4220
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1568
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1668
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1096
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5056
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2224
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2560
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3528
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4788
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1284 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:632
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:768
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2412
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:404
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4388
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2276
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4756 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:932 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1536
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1680
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1828
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3684
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4344
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2272
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2124
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3468
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1904
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3384
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4132
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2432
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.2MB
MD55d7a1e7e0c225f8131daf2a7891e36b0
SHA19a67bbe7e57f8dcc8e1884996488e0f5d2908839
SHA25677169531c732944aade871ee0a327ec902dfa299bee69982420fc7a4522421e0
SHA512dab8de047fa4a70dcbc03d6b6ec8ea11362acd116658f27b1d3d94bc73ee57be1c3919b88962230616cdf5e9e659636dca12429647152abf94afd44832735f57
-
Filesize
2.2MB
MD5d29728f333ed409bd1f3bcc12b766cbc
SHA10a8844cb589cf5c537fc6695bf66fcd785f94ce1
SHA2569b97e91640d299eb48fc03ba30351d89fc657b2e975d73a4bb810c27c8cfff20
SHA512d27229aad09d4e36706d07e39ba8b8df0f368a278b6972feb3a0f546a9fd14f086f88a1859c0a53f5978cf4fdc166278ae698e1a553ea91efbf3ee237a68a126