Analysis

  • max time kernel
    149s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 19:34

General

  • Target

    b4d7796140279c04e2366df7cd8dfa6c_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    b4d7796140279c04e2366df7cd8dfa6c

  • SHA1

    00df7767a84e1078488c3a0fac9582c5bc7e92eb

  • SHA256

    0d1fb88dc9afec0f96aec068750a6a34fa438aad3de8fa88e410de63fa8107bc

  • SHA512

    9a66b393fddec28e146e04ccffc2f2bc2b06ec05b97cc22f76ee6128a89cf9b2d84be15b97ccef28a2d9184d889a89c1bc0d00680445c761ade1ea00e9a80e7f

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZf:0UzeyQMS4DqodCnoe+iitjWwwD

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 56 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d7796140279c04e2366df7cd8dfa6c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d7796140279c04e2366df7cd8dfa6c_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3660
      • C:\Users\Admin\AppData\Local\Temp\b4d7796140279c04e2366df7cd8dfa6c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\b4d7796140279c04e2366df7cd8dfa6c_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3096
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:3212
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5100
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3572
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4640
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3888
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:4636
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1008
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2304
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2052
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1488
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3088
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5024
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:4604
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:4520
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2640
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:232
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2572
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3316
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3604
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4480
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2320
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3008
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4676
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1132
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:5036
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:376
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4608
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:4280
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:2904
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:5044
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4432
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:4084
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3928
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1004
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:4980
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:2636
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:1068
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2208
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3092
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:3044
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:1056
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:4020
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:920
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:116
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:3056
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                              PID:4160
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:4072
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1884
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:5040
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4908
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:2444
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1880
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:4776
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2652
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:1616
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2116
                          • \??\c:\windows\system\explorer.exe
                            c:\windows\system\explorer.exe
                            7⤵
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            PID:2264
                            • \??\c:\windows\system\explorer.exe
                              "c:\windows\system\explorer.exe"
                              8⤵
                                PID:4964
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4948
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2504
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4456
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:4672
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:1076
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1204
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:1816
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:4764
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:3668
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:4816
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:3048
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:2912
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:2804
                              • \??\c:\windows\system\explorer.exe
                                "c:\windows\system\explorer.exe"
                                8⤵
                                  PID:884
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:2620
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:2624
                              • \??\c:\windows\system\explorer.exe
                                c:\windows\system\explorer.exe
                                7⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:860
                                • \??\c:\windows\system\explorer.exe
                                  "c:\windows\system\explorer.exe"
                                  8⤵
                                    PID:1660
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:3832
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                  PID:1692
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:2480
                                    • \??\c:\windows\system\explorer.exe
                                      "c:\windows\system\explorer.exe"
                                      8⤵
                                        PID:4896
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:4488
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:3636
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        PID:1576
                                        • \??\c:\windows\system\explorer.exe
                                          "c:\windows\system\explorer.exe"
                                          8⤵
                                            PID:856
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Drops file in Windows directory
                                      PID:2336
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                          PID:2360
                                          • \??\c:\windows\system\explorer.exe
                                            c:\windows\system\explorer.exe
                                            7⤵
                                            • Drops file in Windows directory
                                            PID:4992
                                            • \??\c:\windows\system\explorer.exe
                                              "c:\windows\system\explorer.exe"
                                              8⤵
                                                PID:968
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:3064
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                              PID:1112
                                              • \??\c:\windows\system\explorer.exe
                                                c:\windows\system\explorer.exe
                                                7⤵
                                                • Drops file in Windows directory
                                                PID:1968
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:4960
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:2920
                                                • \??\c:\windows\system\explorer.exe
                                                  c:\windows\system\explorer.exe
                                                  7⤵
                                                    PID:3128
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Windows directory
                                                PID:4208
                                                • \??\c:\windows\system\spoolsv.exe
                                                  "c:\windows\system\spoolsv.exe"
                                                  6⤵
                                                    PID:4420
                                                    • \??\c:\windows\system\explorer.exe
                                                      c:\windows\system\explorer.exe
                                                      7⤵
                                                      • Drops file in Windows directory
                                                      PID:1972
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Suspicious use of SetThreadContext
                                                  • Drops file in Windows directory
                                                  PID:4484
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:2180
                                                      • \??\c:\windows\system\explorer.exe
                                                        c:\windows\system\explorer.exe
                                                        7⤵
                                                        • Drops file in Windows directory
                                                        PID:2892
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • Suspicious use of SetThreadContext
                                                    PID:2488
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      "c:\windows\system\spoolsv.exe"
                                                      6⤵
                                                        PID:3512
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      PID:2040
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:2836
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Suspicious use of SetThreadContext
                                                        • Drops file in Windows directory
                                                        PID:4692
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          "c:\windows\system\spoolsv.exe"
                                                          6⤵
                                                            PID:2664
                                                            • \??\c:\windows\system\explorer.exe
                                                              c:\windows\system\explorer.exe
                                                              7⤵
                                                              • Drops file in Windows directory
                                                              PID:1456
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Suspicious use of SetThreadContext
                                                          • Drops file in Windows directory
                                                          PID:244
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            "c:\windows\system\spoolsv.exe"
                                                            6⤵
                                                              PID:3664
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Suspicious use of SetThreadContext
                                                            PID:1864
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              "c:\windows\system\spoolsv.exe"
                                                              6⤵
                                                                PID:1752
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Suspicious use of SetThreadContext
                                                              • Drops file in Windows directory
                                                              PID:5000
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                "c:\windows\system\spoolsv.exe"
                                                                6⤵
                                                                  PID:2476
                                                                  • \??\c:\windows\system\explorer.exe
                                                                    c:\windows\system\explorer.exe
                                                                    7⤵
                                                                      PID:1100
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  c:\windows\system\spoolsv.exe SE
                                                                  5⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • Drops file in Windows directory
                                                                  PID:1952
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    "c:\windows\system\spoolsv.exe"
                                                                    6⤵
                                                                      PID:4756
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    • Drops file in Windows directory
                                                                    PID:1764
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      "c:\windows\system\spoolsv.exe"
                                                                      6⤵
                                                                        PID:3772
                                                                        • \??\c:\windows\system\explorer.exe
                                                                          c:\windows\system\explorer.exe
                                                                          7⤵
                                                                            PID:4876
                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                        c:\windows\system\spoolsv.exe SE
                                                                        5⤵
                                                                        • Drops file in Windows directory
                                                                        PID:2068
                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                        c:\windows\system\spoolsv.exe SE
                                                                        5⤵
                                                                          PID:2472
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          PID:4536
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          PID:3052
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          PID:3880
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          PID:868
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                            PID:1988
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:2992
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:4772
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:2852
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:4812
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:1732
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:4996
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                            • Drops file in Windows directory
                                                                            PID:3252
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            c:\windows\system\spoolsv.exe SE
                                                                            5⤵
                                                                              PID:3312
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                      1⤵
                                                                        PID:2596

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Windows\Parameters.ini

                                                                        Filesize

                                                                        74B

                                                                        MD5

                                                                        6687785d6a31cdf9a5f80acb3abc459b

                                                                        SHA1

                                                                        1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                                        SHA256

                                                                        3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                                        SHA512

                                                                        5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                                      • C:\Windows\System\explorer.exe

                                                                        Filesize

                                                                        2.2MB

                                                                        MD5

                                                                        7a3c86629f551823f09a72433809f13f

                                                                        SHA1

                                                                        ddfc0137b2efde09917c9a9b8550e84199ce4e47

                                                                        SHA256

                                                                        e904491dc721d9d8d341869cd8e5b7c7a6e33f8d9fd0d34a7e2af95fb0d86607

                                                                        SHA512

                                                                        5e0c2549523d26503b7c0ba4dd82d5e27c4abef1378fe9c47315b73f603d1f568bc9b81fd337276f2375c11e23e1303ae63ecd324cc3a8b2a2f854228e63b22d

                                                                      • C:\Windows\System\spoolsv.exe

                                                                        Filesize

                                                                        2.2MB

                                                                        MD5

                                                                        4325074a289a270badc54d8629b21f98

                                                                        SHA1

                                                                        b8276c1634c684237685571813e39e7bdbbf3d07

                                                                        SHA256

                                                                        833440800c053eeae3eccc10b9f9729f46b013e8d6d93d4ed6a28a298378c783

                                                                        SHA512

                                                                        0b4cdc66bc1a0b5cd57e191c929c361cba1430032019a45a5e88e7720ab5ae78959c6529bb90c2d7b937ea3edea5acc0583f65592158c8e30b2b6f82f1ffec85

                                                                      • memory/116-2742-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/116-2886-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/232-2167-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/376-3861-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/856-5149-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/884-4892-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/920-1893-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/968-5327-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1004-2569-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1004-2715-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1008-814-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/1008-1984-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/1056-1892-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/1068-1708-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/1112-4052-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1132-2372-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1132-2552-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1204-3014-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1488-1994-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1616-2146-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/1660-4912-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1692-3590-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1752-5053-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1880-2842-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/1884-2752-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2052-1996-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2052-1002-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2116-2897-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2116-3082-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2180-4980-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2180-4871-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2208-2579-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2304-1982-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2304-1979-0x0000000000440000-0x0000000000509000-memory.dmp

                                                                        Filesize

                                                                        804KB

                                                                      • memory/2320-1372-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2360-3836-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2360-3964-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2444-1981-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2476-5116-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2476-5226-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2504-2913-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2572-1175-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2624-3283-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2636-4126-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2636-4123-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2640-1174-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2652-2852-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2664-5013-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2812-0-0x0000000000700000-0x0000000000701000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2812-52-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2812-48-0x0000000000700000-0x0000000000701000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2812-46-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2836-4899-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2904-1528-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/2912-3256-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2920-4252-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/2920-4355-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3008-2274-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3044-2637-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3088-1003-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3092-1709-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3096-89-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3096-49-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3096-51-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3212-100-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3212-95-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3316-2179-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3572-813-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3572-1903-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3604-1176-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/3636-3671-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3664-5022-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3664-5025-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3772-5317-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/3928-1707-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4020-2680-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4020-2683-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4072-1894-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4084-2491-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4160-4524-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4280-2381-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4420-4603-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4432-1529-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4480-2189-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4520-3747-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4608-1527-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4636-3491-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4640-1902-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4640-2068-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4672-3000-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4676-1373-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4776-1993-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4816-3042-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4896-5034-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4908-2830-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/4964-4798-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/5024-2148-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/5024-2350-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/5040-1900-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/5044-2390-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/5100-812-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB

                                                                      • memory/5100-99-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                        Filesize

                                                                        248KB