Analysis
-
max time kernel
104s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 20:32
Behavioral task
behavioral1
Sample
b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
b511cb6dbc15446ef0925af2125b21e5
-
SHA1
e89b02ac5d71bd68543fa85a1ad4846069aff66b
-
SHA256
ea13e15943fdb85008435c24c723fa7eed545365882f28ac60f937437acaf7a9
-
SHA512
d4437ac8919a9d6ec7908c2e52dff7294a253dece6cd5902d915352df0c62491f16ab8df4a51153b4d3613d7daa72d33488abb80714a362c5277925de272caa7
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ/:0UzeyQMS4DqodCnoe+iitjWwwj
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe -
Executes dropped EXE 58 IoCs
pid Process 3640 explorer.exe 4532 explorer.exe 3864 spoolsv.exe 572 spoolsv.exe 1312 spoolsv.exe 1844 spoolsv.exe 1420 spoolsv.exe 2448 spoolsv.exe 1076 spoolsv.exe 3940 spoolsv.exe 4088 spoolsv.exe 788 spoolsv.exe 4288 spoolsv.exe 2352 spoolsv.exe 4220 spoolsv.exe 4500 spoolsv.exe 3772 spoolsv.exe 1980 spoolsv.exe 1360 spoolsv.exe 3140 spoolsv.exe 1344 spoolsv.exe 3280 spoolsv.exe 1880 spoolsv.exe 3612 spoolsv.exe 1492 spoolsv.exe 4792 explorer.exe 4064 spoolsv.exe 1596 spoolsv.exe 1132 spoolsv.exe 5084 spoolsv.exe 3420 explorer.exe 3036 spoolsv.exe 960 spoolsv.exe 2328 spoolsv.exe 792 spoolsv.exe 4684 explorer.exe 5096 spoolsv.exe 4652 spoolsv.exe 3816 spoolsv.exe 1988 spoolsv.exe 2648 explorer.exe 2192 spoolsv.exe 1564 spoolsv.exe 4300 spoolsv.exe 408 spoolsv.exe 2052 explorer.exe 4104 spoolsv.exe 2956 spoolsv.exe 988 explorer.exe 2904 spoolsv.exe 4376 spoolsv.exe 3736 explorer.exe 1488 spoolsv.exe 4888 spoolsv.exe 1812 explorer.exe 4196 spoolsv.exe 4696 spoolsv.exe 3692 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 2020 set thread context of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 3640 set thread context of 4532 3640 explorer.exe 92 PID 3864 set thread context of 1492 3864 spoolsv.exe 115 PID 572 set thread context of 1132 572 spoolsv.exe 119 PID 1312 set thread context of 5084 1312 spoolsv.exe 120 PID 1844 set thread context of 960 1844 spoolsv.exe 123 PID 1420 set thread context of 792 1420 spoolsv.exe 125 PID 2448 set thread context of 4652 2448 spoolsv.exe 128 PID 1076 set thread context of 1988 1076 spoolsv.exe 130 PID 3940 set thread context of 1564 3940 spoolsv.exe 133 PID 4088 set thread context of 408 4088 spoolsv.exe 135 PID 788 set thread context of 2956 788 spoolsv.exe 138 PID 4288 set thread context of 4376 4288 spoolsv.exe 141 PID 2352 set thread context of 4888 2352 spoolsv.exe 144 PID 4220 set thread context of 4696 4220 spoolsv.exe 147 -
Drops file in Windows directory 46 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 4532 explorer.exe 1492 spoolsv.exe 1492 spoolsv.exe 1132 spoolsv.exe 1132 spoolsv.exe 5084 spoolsv.exe 5084 spoolsv.exe 960 spoolsv.exe 960 spoolsv.exe 792 spoolsv.exe 792 spoolsv.exe 4652 spoolsv.exe 4652 spoolsv.exe 1988 spoolsv.exe 1988 spoolsv.exe 1564 spoolsv.exe 1564 spoolsv.exe 408 spoolsv.exe 408 spoolsv.exe 2956 spoolsv.exe 2956 spoolsv.exe 4376 spoolsv.exe 4376 spoolsv.exe 4888 spoolsv.exe 4888 spoolsv.exe 4696 spoolsv.exe 4696 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4108 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 82 PID 2020 wrote to memory of 4108 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 82 PID 2020 wrote to memory of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 2020 wrote to memory of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 2020 wrote to memory of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 2020 wrote to memory of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 2020 wrote to memory of 2964 2020 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 87 PID 2964 wrote to memory of 3640 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 88 PID 2964 wrote to memory of 3640 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 88 PID 2964 wrote to memory of 3640 2964 b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe 88 PID 3640 wrote to memory of 4532 3640 explorer.exe 92 PID 3640 wrote to memory of 4532 3640 explorer.exe 92 PID 3640 wrote to memory of 4532 3640 explorer.exe 92 PID 3640 wrote to memory of 4532 3640 explorer.exe 92 PID 3640 wrote to memory of 4532 3640 explorer.exe 92 PID 4532 wrote to memory of 3864 4532 explorer.exe 93 PID 4532 wrote to memory of 3864 4532 explorer.exe 93 PID 4532 wrote to memory of 3864 4532 explorer.exe 93 PID 4532 wrote to memory of 572 4532 explorer.exe 94 PID 4532 wrote to memory of 572 4532 explorer.exe 94 PID 4532 wrote to memory of 572 4532 explorer.exe 94 PID 4532 wrote to memory of 1312 4532 explorer.exe 95 PID 4532 wrote to memory of 1312 4532 explorer.exe 95 PID 4532 wrote to memory of 1312 4532 explorer.exe 95 PID 4532 wrote to memory of 1844 4532 explorer.exe 96 PID 4532 wrote to memory of 1844 4532 explorer.exe 96 PID 4532 wrote to memory of 1844 4532 explorer.exe 96 PID 4532 wrote to memory of 1420 4532 explorer.exe 97 PID 4532 wrote to memory of 1420 4532 explorer.exe 97 PID 4532 wrote to memory of 1420 4532 explorer.exe 97 PID 4532 wrote to memory of 2448 4532 explorer.exe 98 PID 4532 wrote to memory of 2448 4532 explorer.exe 98 PID 4532 wrote to memory of 2448 4532 explorer.exe 98 PID 4532 wrote to memory of 1076 4532 explorer.exe 99 PID 4532 wrote to memory of 1076 4532 explorer.exe 99 PID 4532 wrote to memory of 1076 4532 explorer.exe 99 PID 4532 wrote to memory of 3940 4532 explorer.exe 100 PID 4532 wrote to memory of 3940 4532 explorer.exe 100 PID 4532 wrote to memory of 3940 4532 explorer.exe 100 PID 4532 wrote to memory of 4088 4532 explorer.exe 101 PID 4532 wrote to memory of 4088 4532 explorer.exe 101 PID 4532 wrote to memory of 4088 4532 explorer.exe 101 PID 4532 wrote to memory of 788 4532 explorer.exe 102 PID 4532 wrote to memory of 788 4532 explorer.exe 102 PID 4532 wrote to memory of 788 4532 explorer.exe 102 PID 4532 wrote to memory of 4288 4532 explorer.exe 103 PID 4532 wrote to memory of 4288 4532 explorer.exe 103 PID 4532 wrote to memory of 4288 4532 explorer.exe 103 PID 4532 wrote to memory of 2352 4532 explorer.exe 104 PID 4532 wrote to memory of 2352 4532 explorer.exe 104 PID 4532 wrote to memory of 2352 4532 explorer.exe 104 PID 4532 wrote to memory of 4220 4532 explorer.exe 105 PID 4532 wrote to memory of 4220 4532 explorer.exe 105 PID 4532 wrote to memory of 4220 4532 explorer.exe 105 PID 4532 wrote to memory of 4500 4532 explorer.exe 106 PID 4532 wrote to memory of 4500 4532 explorer.exe 106 PID 4532 wrote to memory of 4500 4532 explorer.exe 106 PID 4532 wrote to memory of 3772 4532 explorer.exe 107 PID 4532 wrote to memory of 3772 4532 explorer.exe 107 PID 4532 wrote to memory of 3772 4532 explorer.exe 107 PID 4532 wrote to memory of 1980 4532 explorer.exe 108 PID 4532 wrote to memory of 1980 4532 explorer.exe 108 PID 4532 wrote to memory of 1980 4532 explorer.exe 108 PID 4532 wrote to memory of 1360 4532 explorer.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b511cb6dbc15446ef0925af2125b21e5_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3864 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4792 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4176
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5084 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3420 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2288
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1844 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1420 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4684 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1836
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2648 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2796
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:408 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2052 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4600
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:788 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:988 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4892
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4376 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3736 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:908
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4888 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1812 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3540
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4696 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
PID:3692 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1308
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4500 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3364
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4596
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5008
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:8
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3388
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3436
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4952
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3140 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4976
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3824
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4456
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3280 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1040
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2408
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1624
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4956
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1020
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2740
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1716
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1860
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3652
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4948
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2328 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5096 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3160
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1472
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4300 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4488
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1488 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:4196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3372
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3460
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3144
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3528
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:704
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2744
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2156
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4232
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:860
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2840
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3596
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:644
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4940
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4776
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4728
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2188
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3952
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2596
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1200
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4752
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3988
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2660
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2960
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2172
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:460
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2900
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2852
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5092
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5c0173dbc0197ccf2f0fa51decd4e6739
SHA1ac655d9cb643ec66fed73ba49eb02dea022a8ce8
SHA256cc82eed28e11b0d496e97de5b7a5d4ffe10878008f13a3167897c35ee4cafc8f
SHA512f0da40cdca0d2038a390ed0d8c90d4b090068ca30adbcf70f9c8e1ca50513e59ee03467e392879c4491aaf960a31c1ad9517821477eb55e9264fcfc5e151429f
-
Filesize
2.2MB
MD5f865ca20c82fbe9cd456a2875d49bba5
SHA1c25ab232617e15322ee6f24c535f89c1d5bc5911
SHA256414f578271541af9775c9fe108301601f38b8e6b9dbbb19d0bec04c12b2d8fd3
SHA5120c82f58387e7647c39c49758c38f621940544071f5740fe12092b6be836a4702e647c25eb047ba852ffece925d4669f6e0f17fa5b7b58d2cb7eee9fb1d01fa36