Analysis

  • max time kernel
    148s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 08:48

General

  • Target

    a8ce89f645360a94d3f5047921950625_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    a8ce89f645360a94d3f5047921950625

  • SHA1

    6d7b7f1edfc7bf341b3c7830ad4cabf89170c76c

  • SHA256

    f10db93e25e680bc4e8a81a3ca8588b1b21ae42f9375ec037d7d832de0f38658

  • SHA512

    0b64e340845617b2437ccb6be975665b9089fcadb474b22de1edfbd46522e9a5b32a9a6acb8185f12061a9a08d31d058a407806af8da83074ffd89c1274c14cd

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZH:0UzeyQMS4DqodCnoe+iitjWwwL

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 54 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8ce89f645360a94d3f5047921950625_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8ce89f645360a94d3f5047921950625_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1316
      • C:\Users\Admin\AppData\Local\Temp\a8ce89f645360a94d3f5047921950625_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a8ce89f645360a94d3f5047921950625_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1272
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1648
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2732
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2116
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4592
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3292
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:1952
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4528
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1516
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4372
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3044
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3220
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4568
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1284
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4572
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1844
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4548
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:5048
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1532
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4924
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4916
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2152
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4912
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4628
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:916
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3760
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4876
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3172
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4864
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4988
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:640
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:980
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4836
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3264
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3748
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3960
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1824
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4708
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4472
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:2592
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:468
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4832
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2676
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3140
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4800
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:516
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4632
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:812
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:5068
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1216
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4312
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3572
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3844
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2236
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2788
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2268
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3692
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3008
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:5012
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4328
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:1728
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:4908
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:4788
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3224
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:2044
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4348
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:1608
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:868
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                        PID:1600
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4604
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                              PID:3160
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1716
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:2148
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:4480
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:1796
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            PID:4272
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:4464
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:1236
                                  • \??\c:\windows\system\explorer.exe
                                    "c:\windows\system\explorer.exe"
                                    8⤵
                                      PID:732
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:2552
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:3728
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • Drops file in Windows directory
                                      PID:4684
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:4756
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:4560
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:4564
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:1076
                                        • \??\c:\windows\system\explorer.exe
                                          c:\windows\system\explorer.exe
                                          7⤵
                                          • Drops file in Windows directory
                                          PID:4968
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      • Drops file in Windows directory
                                      PID:3776
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                          PID:3156
                                          • \??\c:\windows\system\explorer.exe
                                            c:\windows\system\explorer.exe
                                            7⤵
                                            • Drops file in Windows directory
                                            PID:2644
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        PID:768
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:4188
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:3624
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                              PID:2816
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Suspicious use of SetThreadContext
                                            PID:4728
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:4312
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Suspicious use of SetThreadContext
                                              PID:4716
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                  PID:5004
                                                  • \??\c:\windows\system\explorer.exe
                                                    c:\windows\system\explorer.exe
                                                    7⤵
                                                    • Drops file in Windows directory
                                                    PID:4140
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Windows directory
                                                PID:3544
                                                • \??\c:\windows\system\spoolsv.exe
                                                  "c:\windows\system\spoolsv.exe"
                                                  6⤵
                                                    PID:3328
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Suspicious use of SetThreadContext
                                                  PID:972
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:4552
                                                      • \??\c:\windows\system\explorer.exe
                                                        c:\windows\system\explorer.exe
                                                        7⤵
                                                        • Drops file in Windows directory
                                                        PID:2980
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • Suspicious use of SetThreadContext
                                                    • Drops file in Windows directory
                                                    PID:1984
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      "c:\windows\system\spoolsv.exe"
                                                      6⤵
                                                        PID:648
                                                        • \??\c:\windows\system\explorer.exe
                                                          c:\windows\system\explorer.exe
                                                          7⤵
                                                          • Drops file in Windows directory
                                                          PID:4344
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      PID:3752
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:1988
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Suspicious use of SetThreadContext
                                                        • Drops file in Windows directory
                                                        PID:3912
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          "c:\windows\system\spoolsv.exe"
                                                          6⤵
                                                            PID:5008
                                                            • \??\c:\windows\system\explorer.exe
                                                              c:\windows\system\explorer.exe
                                                              7⤵
                                                                PID:2448
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Suspicious use of SetThreadContext
                                                            • Drops file in Windows directory
                                                            PID:3848
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              "c:\windows\system\spoolsv.exe"
                                                              6⤵
                                                                PID:4608
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Drops file in Windows directory
                                                              PID:4368
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                "c:\windows\system\spoolsv.exe"
                                                                6⤵
                                                                  PID:3232
                                                                  • \??\c:\windows\system\explorer.exe
                                                                    c:\windows\system\explorer.exe
                                                                    7⤵
                                                                      PID:4308
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:2572
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:2604
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:1596
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:3332
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:2300
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:2240
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:3832
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Drops file in Windows directory
                                                                  PID:3192
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                    PID:2396
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:4696
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:412
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                      PID:1108
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                        PID:4596
                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                        c:\windows\system\spoolsv.exe SE
                                                                        5⤵
                                                                          PID:2964
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                  1⤵
                                                                    PID:3944

                                                                  Network

                                                                  MITRE ATT&CK Matrix ATT&CK v13

                                                                  Persistence

                                                                  Boot or Logon Autostart Execution

                                                                  3
                                                                  T1547

                                                                  Registry Run Keys / Startup Folder

                                                                  2
                                                                  T1547.001

                                                                  Winlogon Helper DLL

                                                                  1
                                                                  T1547.004

                                                                  Privilege Escalation

                                                                  Boot or Logon Autostart Execution

                                                                  3
                                                                  T1547

                                                                  Registry Run Keys / Startup Folder

                                                                  2
                                                                  T1547.001

                                                                  Winlogon Helper DLL

                                                                  1
                                                                  T1547.004

                                                                  Defense Evasion

                                                                  Modify Registry

                                                                  4
                                                                  T1112

                                                                  Hide Artifacts

                                                                  1
                                                                  T1564

                                                                  Hidden Files and Directories

                                                                  1
                                                                  T1564.001

                                                                  Discovery

                                                                  System Information Discovery

                                                                  1
                                                                  T1082

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Windows\Parameters.ini
                                                                    Filesize

                                                                    74B

                                                                    MD5

                                                                    6687785d6a31cdf9a5f80acb3abc459b

                                                                    SHA1

                                                                    1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                                    SHA256

                                                                    3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                                    SHA512

                                                                    5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                                  • C:\Windows\System\explorer.exe
                                                                    Filesize

                                                                    2.2MB

                                                                    MD5

                                                                    872e96b4d72b419ae69a77ebbfe4ec51

                                                                    SHA1

                                                                    7b5e777090329a6e6316b740a30a4675c3f897bf

                                                                    SHA256

                                                                    af7590a06193e379107484684962e603a29816f5129e96ac345dae5ee8fe300b

                                                                    SHA512

                                                                    36fceddd0e044cd26e19c25359e2a777d4b06538336f9bc1ca3873824d4109856b0a24996bc63cf2e7dc0addf7a3e429cbd2c08be4b7f0091e0fed57931241a3

                                                                  • C:\Windows\System\spoolsv.exe
                                                                    Filesize

                                                                    2.2MB

                                                                    MD5

                                                                    1a92c1f3cab416a8ec906bd249bdd350

                                                                    SHA1

                                                                    a13428748df2c8d462f5b642ae0d38e57ea8392d

                                                                    SHA256

                                                                    3538aa85af799c614ee4de94bf1eaae4362b4347ab861bb16b12797e789daa86

                                                                    SHA512

                                                                    8d73b80916f63833c17edab2123ff3442ebb74a47598207d7b876426b6d1d24a781ee13dbd3f85bcb12da420bef64b7ca1f8666b78509d3f0fcd44ec99a57701

                                                                  • memory/468-3763-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/516-2053-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/640-2344-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/648-4799-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/732-4105-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/812-2054-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/916-2316-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/916-2333-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/980-1548-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1076-4031-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1076-3932-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1216-2207-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1272-87-0x0000000000440000-0x0000000000509000-memory.dmp
                                                                    Filesize

                                                                    804KB

                                                                  • memory/1272-94-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1272-49-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1272-51-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1284-1359-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1516-2222-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1532-2289-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1600-2943-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1600-2834-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1608-2719-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1648-105-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1648-100-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1728-3949-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1824-2379-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1844-1360-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/1952-3740-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1952-3743-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1988-4756-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/1988-4752-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2116-2201-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2116-1235-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2148-2844-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2152-1363-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2236-2209-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2268-2210-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/2676-2398-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2732-104-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2732-1234-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2788-2512-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2816-4115-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/2816-4112-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3008-2211-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3044-2240-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3140-1875-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3156-4276-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3156-4073-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3160-4084-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3172-1546-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3220-1238-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3232-4988-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3264-1549-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3328-4379-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3572-2208-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3692-2592-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3728-3846-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3728-3732-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3748-2365-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3748-2367-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3760-1365-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/3844-2443-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/3960-1700-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4188-4092-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4312-2437-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4312-4218-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4372-1237-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4464-2955-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4464-3062-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4472-2388-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4528-1236-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4548-2276-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4552-4727-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4552-4593-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4560-3749-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4560-3754-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4572-2264-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4592-2212-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4608-4865-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4608-4861-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4628-1364-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4632-2417-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4632-2415-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4708-1735-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4788-2701-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4800-2406-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4832-1874-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4836-2357-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4836-2352-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4864-2329-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4864-2336-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4876-2323-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4912-2308-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4912-2305-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4916-2297-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/4924-1362-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/4988-1547-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/5004-4434-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/5004-4300-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/5008-4853-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/5012-2694-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                    Filesize

                                                                    248KB

                                                                  • memory/5048-1361-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/5112-0-0x00000000008C0000-0x00000000008C1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/5112-52-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB

                                                                  • memory/5112-48-0x00000000008C0000-0x00000000008C1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/5112-46-0x0000000000400000-0x00000000005D3000-memory.dmp
                                                                    Filesize

                                                                    1.8MB