Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 23:38

General

  • Target

    a2f741b52f9fce44b8e4d958c9a6606f_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    a2f741b52f9fce44b8e4d958c9a6606f

  • SHA1

    7fd929887fd012ca4907c9faf08ee8f3ab2adfe1

  • SHA256

    7406e6dcdf0f2025bbee2487198c4f3a74c3e27026fb443a4bc3401ea0ca7244

  • SHA512

    07dcec8f386396ca50a1faf512c3f143b12d0a28715a78b578a8a583b6f5364b140d3bbff762fa6eb453bad8391a65ee5b6d8f314b6c1dfebaeec386c5c1430c

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZZ:0UzeyQMS4DqodCnoe+iitjWww1

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 22 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 48 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2f741b52f9fce44b8e4d958c9a6606f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2f741b52f9fce44b8e4d958c9a6606f_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4192
      • C:\Users\Admin\AppData\Local\Temp\a2f741b52f9fce44b8e4d958c9a6606f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a2f741b52f9fce44b8e4d958c9a6606f_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4548
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1384
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            PID:4308
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:2552
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2040
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:992
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1456
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:5088
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2744
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:3112
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4280
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:4164
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3756
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:464
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:1528
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:4144
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4628
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:1344
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2756
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:4536
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:5064
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1716
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2940
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:3744
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2844
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4312
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3256
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              PID:4832
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2520
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2868
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2300
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2680
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3948
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3148
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2060
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              PID:2396
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3836
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2304
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:212
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3504
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3964
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3120
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3880
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1640
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:5048
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1228
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4856
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1328
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:1156
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4808
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2840
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3152
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:1472
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3088
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:1692
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3728
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3572
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3900
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3712
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2444
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4712
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4512
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:704
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4276
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:1768
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3188
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:2916
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3324
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:4668
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              PID:4940
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3124
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2240
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4964
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:5008
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:3236
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:224
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:1852
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3264
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                  PID:5020
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:3916
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:4104
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3104
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                      PID:2660
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:4380
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:2360
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:2468
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                          PID:5080
                          • \??\c:\windows\system\explorer.exe
                            c:\windows\system\explorer.exe
                            7⤵
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            PID:4660
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:3800
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:4160
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              PID:4224
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:1648
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:4056
                              • \??\c:\windows\system\explorer.exe
                                c:\windows\system\explorer.exe
                                7⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                PID:936
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Suspicious use of SetThreadContext
                            PID:228
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:1808
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  PID:3780
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:3640
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                  PID:2696
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:1292
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:2636
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:3436
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:4568
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Drops file in Windows directory
                                    PID:4692
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:4072
                                        • \??\c:\windows\system\explorer.exe
                                          c:\windows\system\explorer.exe
                                          7⤵
                                            PID:1148
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Drops file in Windows directory
                                        PID:4324
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:4484
                                            • \??\c:\windows\system\explorer.exe
                                              c:\windows\system\explorer.exe
                                              7⤵
                                                PID:3672
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Drops file in Windows directory
                                            PID:4988
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:2404
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Drops file in Windows directory
                                              PID:2884
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                  PID:1476
                                                  • \??\c:\windows\system\explorer.exe
                                                    c:\windows\system\explorer.exe
                                                    7⤵
                                                      PID:3760
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Drops file in Windows directory
                                                  PID:5000
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:4920
                                                      • \??\c:\windows\system\explorer.exe
                                                        c:\windows\system\explorer.exe
                                                        7⤵
                                                          PID:2892
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:4880
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:4496
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:4516
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                        PID:2772
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        PID:2860
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        PID:3852
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        PID:4032
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                          PID:2952
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:3848
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:3552
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:3276
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                            PID:1576
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                              PID:1384
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                                PID:3936
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                  PID:724
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                    PID:1644
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                      PID:3384
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                              1⤵
                                                                PID:2608

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Windows\Parameters.ini

                                                                Filesize

                                                                74B

                                                                MD5

                                                                6687785d6a31cdf9a5f80acb3abc459b

                                                                SHA1

                                                                1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                                SHA256

                                                                3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                                SHA512

                                                                5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                              • C:\Windows\System\explorer.exe

                                                                Filesize

                                                                2.2MB

                                                                MD5

                                                                442690a7c2ffa3e47e60e88f24f0cddc

                                                                SHA1

                                                                d3e3773e1fee1ed173e21370614bc9ef13bf29a1

                                                                SHA256

                                                                94c58e2507b7b0bfad555dba64d5b568f0756e25bebf2a60945dc87fc21226ce

                                                                SHA512

                                                                62c27fd5a49f75e6b9df9e4d88b03aa5d966ee912630e02a704bdd6b6858f4ecdfefd461d054a9eb7d38eca44cc6dde221848aa5fae09e904168dabfe71ac79f

                                                              • memory/212-2473-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/464-1181-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/704-2839-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1156-2637-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1228-1872-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/1328-1961-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/1344-1183-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/1384-85-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/1384-89-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/1456-3528-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1472-2801-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1476-5335-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1476-5468-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1528-2095-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1692-4563-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1768-2847-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1808-4793-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/1852-4813-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2040-2157-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2040-1963-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2060-3961-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2300-42-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2300-0-0x0000000002340000-0x0000000002341000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2300-38-0x0000000002340000-0x0000000002341000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2300-2315-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2300-36-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2304-1696-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2360-5501-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2396-1695-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2404-5233-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2520-2305-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2552-841-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2552-1960-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2636-4823-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2660-3870-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2660-3757-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2680-1694-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2744-2061-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2756-2117-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2868-1540-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/2916-2942-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2916-3106-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/2940-3749-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3112-994-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3112-2072-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3120-1871-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3124-3028-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3152-2060-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3236-3195-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3256-2294-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3504-1870-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3728-2075-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3744-1365-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/3756-2083-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3880-2618-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3880-2748-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3948-2445-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/3964-2482-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4056-4682-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4072-5137-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4072-5019-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4104-5224-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4144-1182-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4160-4327-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4160-4253-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4164-995-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4280-2071-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4308-834-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4308-90-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4312-1366-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4484-5311-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4484-5212-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4536-1364-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4548-39-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4548-41-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4548-77-0x0000000000440000-0x0000000000509000-memory.dmp

                                                                Filesize

                                                                804KB

                                                              • memory/4548-79-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4628-2105-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4668-4785-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4712-2827-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4808-1962-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4832-1539-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/4856-2628-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4920-5494-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/4964-3036-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5020-3624-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5048-4264-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5064-2209-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5064-2355-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5080-4094-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5080-3951-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                Filesize

                                                                248KB

                                                              • memory/5088-2062-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/5088-993-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                Filesize

                                                                1.8MB