Malware Analysis Report

2024-09-22 20:10

Sample ID 240614-kvfmxaxckk
Target a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118
SHA256 bd2f8ebb41b4ae907f2eb770fd65221898b43b22733f8ce4fb2572e655461f58
Tags
pony evasion persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bd2f8ebb41b4ae907f2eb770fd65221898b43b22733f8ce4fb2572e655461f58

Threat Level: Known bad

The file a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

pony evasion persistence rat spyware stealer

Pony family

Modifies visiblity of hidden/system files in Explorer

Modifies WinLogon for persistence

Pony,Fareit

Modifies Installed Components in the registry

Executes dropped EXE

Drops startup file

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 08:55

Signatures

Pony family

pony

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 08:55

Reported

2024-06-14 08:57

Platform

win7-20240611-en

Max time kernel

149s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\explorer.exe N/A

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\explorer.exe N/A

Pony,Fareit

rat spyware stealer pony

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\explorer.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\explorer.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Parameters.ini C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2240 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2240 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2240 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2240 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2240 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 2640 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2640 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2640 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2640 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2672 wrote to memory of 2196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2196 wrote to memory of 1516 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1516 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1516 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1516 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1724 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1724 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1724 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1724 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1544 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1544 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1544 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 2196 wrote to memory of 1544 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

Network

N/A

Files

memory/2240-0-0x0000000000230000-0x0000000000231000-memory.dmp

C:\Windows\Parameters.ini

MD5 6687785d6a31cdf9a5f80acb3abc459b
SHA1 1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA256 3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA512 5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

memory/2240-17-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2240-19-0x0000000000230000-0x0000000000231000-memory.dmp

memory/2640-20-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2640-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2640-27-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2240-29-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2640-28-0x0000000000400000-0x000000000043E000-memory.dmp

\Windows\system\explorer.exe

MD5 06ed071f5d68a99363cb4224d3e059eb
SHA1 525721b1a3ea267393494b4166b6884a5dfd2300
SHA256 338758205b6f1d9b43f5aaa55568c0b286e54ddf31583f0d88b4cedd991c2576
SHA512 3c53edc03d531d33cd9efe71e2ca16b730390e410db182ec143d6eae1e89e624a371ec3f3c83731a7e9330b4ace3ce798e27e0ddb1910d3f573ac98aaeb85bd6

memory/2672-42-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2640-51-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2640-49-0x0000000000440000-0x000000000051F000-memory.dmp

memory/2672-62-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2672-72-0x0000000000400000-0x00000000005D3000-memory.dmp

\Windows\system\spoolsv.exe

MD5 226b9dccc6820bf7ffb53047a19ec8b8
SHA1 b490a9d5c2b3ec084c232b2f65b23e3753339350
SHA256 5553d56559460d5a12b366e102143048988ba9a9be796a66c9912da904a29dce
SHA512 c00fe33647d2c78c3118f0dc4cf8f3ebf557a9aa758bf0b785e21bda86be66e870ff8a958b9761e282dc15b9743a5d6dcbc7b020e7f2d1e1c06241c118bfadff

C:\Windows\Parameters.ini

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2196-1324-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1516-1325-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1724-1326-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1544-1603-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/236-1604-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1756-1605-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3064-1606-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2736-1607-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1748-1883-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2252-1889-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2188-1888-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3000-1886-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1980-1885-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1132-1884-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/776-1887-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2824-2143-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/588-2144-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2628-2145-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2524-2151-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2612-2150-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2444-2149-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1728-2147-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1972-2146-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3068-2148-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/320-2152-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2448-2383-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2420-2381-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/616-2379-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1396-2378-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2660-2382-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1160-2380-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3340-3134-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3476-3145-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4056-3184-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3340-3187-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4364-3285-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4488-3282-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3200-3233-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4916-3356-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 08:55

Reported

2024-06-14 08:57

Platform

win10v2004-20240611-en

Max time kernel

142s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\explorer.exe N/A

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\explorer.exe N/A

Pony,Fareit

rat spyware stealer pony

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\explorer.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\explorer.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3400 set thread context of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 1164 set thread context of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2400 set thread context of 1612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 408 set thread context of 4892 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4240 set thread context of 4572 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3772 set thread context of 4644 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3112 set thread context of 4892 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4852 set thread context of 2844 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4104 set thread context of 548 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1464 set thread context of 4992 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4036 set thread context of 4300 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3848 set thread context of 2944 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4196 set thread context of 4232 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2560 set thread context of 4988 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3896 set thread context of 2324 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 884 set thread context of 3656 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4008 set thread context of 4744 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2900 set thread context of 1636 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1468 set thread context of 2196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2624 set thread context of 1284 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3744 set thread context of 3964 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 116 set thread context of 4448 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4912 set thread context of 868 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3472 set thread context of 4652 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3612 set thread context of 1068 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 8 set thread context of 696 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4952 set thread context of 1160 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3272 set thread context of 2180 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4856 set thread context of 464 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4472 set thread context of 3432 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2272 set thread context of 3512 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1736 set thread context of 4552 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1164 set thread context of 4568 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2848 set thread context of 1556 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4936 set thread context of 1980 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 800 set thread context of 1116 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3764 set thread context of 3948 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2352 set thread context of 1184 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 220 set thread context of 3836 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 348 set thread context of 3752 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1484 set thread context of 2124 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4272 set thread context of 4384 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2396 set thread context of 4192 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4184 set thread context of 3208 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 3664 set thread context of 3212 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3336 set thread context of 2236 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 5044 set thread context of 3468 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3496 set thread context of 2348 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 2676 set thread context of 448 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3924 set thread context of 3124 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2640 set thread context of 4340 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4292 set thread context of 1836 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 692 set thread context of 4660 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3900 set thread context of 1400 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\system\udsys.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3400 wrote to memory of 3516 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 3400 wrote to memory of 3516 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 3400 wrote to memory of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 3400 wrote to memory of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 3400 wrote to memory of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 3400 wrote to memory of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 3400 wrote to memory of 3636 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe
PID 3636 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 3636 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 3636 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 1164 wrote to memory of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1164 wrote to memory of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1164 wrote to memory of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1164 wrote to memory of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1164 wrote to memory of 112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 112 wrote to memory of 2400 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2400 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2400 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 408 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 408 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 408 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4240 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4240 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4240 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3772 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3772 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3772 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3112 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4852 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4852 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4852 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4104 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4104 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4104 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 1464 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 1464 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 1464 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4036 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4036 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4036 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3848 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3848 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3848 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4196 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2560 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2560 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2560 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3896 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3896 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 3896 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 884 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 884 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 884 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4008 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4008 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 4008 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2900 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2900 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 2900 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe
PID 112 wrote to memory of 1468 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc

C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8d4d2f732e0ff7245a034a55eeea12b_JaffaCakes118.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

memory/3400-0-0x0000000002470000-0x0000000002471000-memory.dmp

C:\Windows\Parameters.ini

MD5 6687785d6a31cdf9a5f80acb3abc459b
SHA1 1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA256 3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA512 5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

memory/3400-36-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3400-38-0x0000000002470000-0x0000000002471000-memory.dmp

memory/3636-39-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3636-42-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3400-44-0x0000000000400000-0x00000000005D3000-memory.dmp

C:\Windows\System\explorer.exe

MD5 550cfb9ac7c6c49b5149258a3ca1875f
SHA1 dfe5fabad66019a48ecc838b3689571e03c2e5a3
SHA256 1319f876ca2d8689f98c2cc875ad0c84a1f80963cfd1d59771525994cf9f23f2
SHA512 031afbb0c2bd17354da5614e10a3ff9dcb580567a951d3d104a56848907df18d2b020de2dc4b877223417c215425fff30f11cabfc6dba62641c9a61a9ab64f58

memory/3636-88-0x0000000000440000-0x0000000000509000-memory.dmp

memory/3636-90-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1164-101-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/112-105-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1164-107-0x0000000000400000-0x00000000005D3000-memory.dmp

C:\Windows\System\spoolsv.exe

MD5 006997d4ca243b96097bfefadb63a747
SHA1 6390cf95832cf09a0f3a8e376ecbe077b8c323e2
SHA256 aeb8f9e84d5b87a8077423df70f3b039251d93ca98be2fdc61a145c68334450a
SHA512 bac105bf029c27b55bd9ee3ece6be5ea65f82743919282bda11c2b09691c5f52e4960c7bebcca57cce454d4ab2cf07b5c279d0a2030f65dc0b5ad8bc0d455409

C:\Windows\Parameters.ini

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/112-970-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2400-971-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4240-1168-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3772-1169-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/408-1167-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4852-1381-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4104-1382-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3112-1380-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1464-1598-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3848-1600-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4036-1599-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4196-1798-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3896-1810-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2560-1799-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/884-2029-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1468-2032-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2900-2031-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4008-2030-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3744-2222-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2624-2221-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/116-2223-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2400-2304-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1612-2303-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3472-2302-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4912-2301-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3612-2310-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/408-2314-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4892-2316-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4892-2311-0x0000000000400000-0x000000000043E000-memory.dmp

memory/8-2405-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4572-2406-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4240-2408-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4644-2418-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4892-2429-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2844-2438-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1612-2484-0x0000000000400000-0x000000000043E000-memory.dmp

memory/548-2563-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4992-2613-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4300-2623-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2944-2632-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2944-2636-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4232-2645-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4988-2685-0x0000000000400000-0x000000000043E000-memory.dmp

memory/548-2765-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3656-2801-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4744-2810-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1636-2824-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1636-2821-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2196-2832-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1284-2914-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1284-2923-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2324-2955-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3964-2991-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4448-3003-0x0000000000400000-0x000000000043E000-memory.dmp

memory/868-3011-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4652-3022-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1068-3111-0x0000000000400000-0x000000000043E000-memory.dmp

memory/696-3121-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3964-3161-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1160-3188-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1160-3163-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2180-3222-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3432-3237-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4552-3252-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4568-3262-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4568-3266-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1556-3353-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2180-3403-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1980-3432-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1980-3576-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1116-3794-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1116-3857-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3948-4012-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1184-4095-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3836-4381-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3752-4389-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3752-4391-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3836-4504-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2124-4658-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4384-4669-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4192-4927-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4192-5036-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3208-5140-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3212-5424-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2236-5439-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3468-5448-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2348-5470-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3124-5477-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4660-5500-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1836-5517-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3920-5526-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4028-5549-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1112-5557-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3016-5565-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3592-5682-0x0000000000400000-0x000000000043E000-memory.dmp

memory/60-5780-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3592-5817-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3464-5845-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3464-5963-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1824-6073-0x0000000000400000-0x000000000043E000-memory.dmp