Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 02:17
Behavioral task
behavioral1
Sample
b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
b65a0a8742287b58b4a798b1a433ca69
-
SHA1
e7787a0ed86f6539bbdea3dced78ae5f084dc60c
-
SHA256
eb071fe6333d09c9bef9b0f181c9feb280becc356b7b24842ed5d04f9c8e23fd
-
SHA512
dc6c0b04f4bd091285fbb8c62ee085a8d494a3ffe66684d14a37cc0da784a0797cf667651f87e229e34bccbdee926a561ec0194d08a63a5194b07b60f2918242
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZu:0UzeyQMS4DqodCnoe+iitjWwwC
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3604 explorer.exe 3488 explorer.exe 2104 spoolsv.exe 2820 spoolsv.exe 5044 spoolsv.exe 4152 spoolsv.exe 3852 spoolsv.exe 2244 spoolsv.exe 4252 spoolsv.exe 3752 spoolsv.exe 2620 spoolsv.exe 3264 spoolsv.exe 3384 spoolsv.exe 3092 spoolsv.exe 2952 spoolsv.exe 2380 spoolsv.exe 3532 spoolsv.exe 1448 spoolsv.exe 8 spoolsv.exe 1912 spoolsv.exe 2140 spoolsv.exe 1800 spoolsv.exe 1972 spoolsv.exe 1608 spoolsv.exe 624 spoolsv.exe 1632 spoolsv.exe 4036 spoolsv.exe 1700 spoolsv.exe 4508 spoolsv.exe 5212 spoolsv.exe 5516 spoolsv.exe 5864 spoolsv.exe 3124 spoolsv.exe 1604 spoolsv.exe 5172 explorer.exe 5468 spoolsv.exe 5572 spoolsv.exe 5768 spoolsv.exe 6072 spoolsv.exe 6116 explorer.exe 5356 spoolsv.exe 5452 spoolsv.exe 5552 spoolsv.exe 5628 spoolsv.exe 5792 spoolsv.exe 6136 spoolsv.exe 5124 explorer.exe 5264 spoolsv.exe 5320 spoolsv.exe 5624 spoolsv.exe 5716 spoolsv.exe 5936 explorer.exe 5948 spoolsv.exe 5944 spoolsv.exe 5996 spoolsv.exe 6064 spoolsv.exe 5412 spoolsv.exe 5440 spoolsv.exe 3680 spoolsv.exe 5968 spoolsv.exe 4020 explorer.exe 4244 spoolsv.exe 5924 spoolsv.exe 6092 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 39 IoCs
description pid Process procid_target PID 3040 set thread context of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 3604 set thread context of 3488 3604 explorer.exe 105 PID 2104 set thread context of 1604 2104 spoolsv.exe 137 PID 2820 set thread context of 5572 2820 spoolsv.exe 140 PID 5044 set thread context of 5768 5044 spoolsv.exe 141 PID 4152 set thread context of 6072 4152 spoolsv.exe 142 PID 3852 set thread context of 5452 3852 spoolsv.exe 145 PID 2244 set thread context of 5552 2244 spoolsv.exe 146 PID 4252 set thread context of 5628 4252 spoolsv.exe 147 PID 3752 set thread context of 6136 3752 spoolsv.exe 149 PID 2620 set thread context of 5264 2620 spoolsv.exe 151 PID 3264 set thread context of 5320 3264 spoolsv.exe 152 PID 3384 set thread context of 5716 3384 spoolsv.exe 154 PID 3092 set thread context of 5948 3092 spoolsv.exe 156 PID 2952 set thread context of 5944 2952 spoolsv.exe 157 PID 2380 set thread context of 5996 2380 spoolsv.exe 158 PID 3532 set thread context of 6064 3532 spoolsv.exe 159 PID 1448 set thread context of 5440 1448 spoolsv.exe 161 PID 8 set thread context of 3680 8 spoolsv.exe 162 PID 1912 set thread context of 5968 1912 spoolsv.exe 163 PID 2140 set thread context of 4244 2140 spoolsv.exe 165 PID 1800 set thread context of 5924 1800 spoolsv.exe 166 PID 1972 set thread context of 6092 1972 spoolsv.exe 167 PID 1608 set thread context of 3548 1608 spoolsv.exe 168 PID 624 set thread context of 5384 624 spoolsv.exe 169 PID 1632 set thread context of 4540 1632 spoolsv.exe 170 PID 4036 set thread context of 5856 4036 spoolsv.exe 172 PID 1700 set thread context of 2028 1700 spoolsv.exe 174 PID 4508 set thread context of 2372 4508 spoolsv.exe 175 PID 5212 set thread context of 5316 5212 spoolsv.exe 176 PID 5516 set thread context of 5456 5516 spoolsv.exe 178 PID 5864 set thread context of 5712 5864 spoolsv.exe 179 PID 3124 set thread context of 4680 3124 spoolsv.exe 181 PID 5172 set thread context of 5560 5172 explorer.exe 184 PID 5468 set thread context of 1384 5468 spoolsv.exe 186 PID 6116 set thread context of 5100 6116 explorer.exe 190 PID 5356 set thread context of 5144 5356 spoolsv.exe 191 PID 5792 set thread context of 4848 5792 spoolsv.exe 198 PID 5124 set thread context of 1112 5124 explorer.exe 200 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 3488 explorer.exe 1604 spoolsv.exe 1604 spoolsv.exe 5572 spoolsv.exe 5572 spoolsv.exe 5768 spoolsv.exe 5768 spoolsv.exe 6072 spoolsv.exe 6072 spoolsv.exe 5452 spoolsv.exe 5452 spoolsv.exe 5552 spoolsv.exe 5552 spoolsv.exe 5628 spoolsv.exe 5628 spoolsv.exe 6136 spoolsv.exe 6136 spoolsv.exe 5264 spoolsv.exe 5264 spoolsv.exe 5320 spoolsv.exe 5320 spoolsv.exe 5716 spoolsv.exe 5716 spoolsv.exe 5948 spoolsv.exe 5948 spoolsv.exe 5944 spoolsv.exe 5944 spoolsv.exe 5996 spoolsv.exe 5996 spoolsv.exe 6064 spoolsv.exe 6064 spoolsv.exe 5440 spoolsv.exe 5440 spoolsv.exe 3680 spoolsv.exe 3680 spoolsv.exe 5968 spoolsv.exe 5968 spoolsv.exe 4244 spoolsv.exe 4244 spoolsv.exe 5924 spoolsv.exe 5924 spoolsv.exe 6092 spoolsv.exe 6092 spoolsv.exe 3548 spoolsv.exe 3548 spoolsv.exe 5384 spoolsv.exe 5384 spoolsv.exe 4540 spoolsv.exe 4540 spoolsv.exe 5856 spoolsv.exe 5856 spoolsv.exe 2028 spoolsv.exe 2028 spoolsv.exe 2372 spoolsv.exe 2372 spoolsv.exe 5316 spoolsv.exe 5316 spoolsv.exe 5456 spoolsv.exe 5456 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1072 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 89 PID 3040 wrote to memory of 1072 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 89 PID 3040 wrote to memory of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 3040 wrote to memory of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 3040 wrote to memory of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 3040 wrote to memory of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 3040 wrote to memory of 4056 3040 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 96 PID 4056 wrote to memory of 3604 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 97 PID 4056 wrote to memory of 3604 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 97 PID 4056 wrote to memory of 3604 4056 b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe 97 PID 3604 wrote to memory of 3488 3604 explorer.exe 105 PID 3604 wrote to memory of 3488 3604 explorer.exe 105 PID 3604 wrote to memory of 3488 3604 explorer.exe 105 PID 3604 wrote to memory of 3488 3604 explorer.exe 105 PID 3604 wrote to memory of 3488 3604 explorer.exe 105 PID 3488 wrote to memory of 2104 3488 explorer.exe 106 PID 3488 wrote to memory of 2104 3488 explorer.exe 106 PID 3488 wrote to memory of 2104 3488 explorer.exe 106 PID 3488 wrote to memory of 2820 3488 explorer.exe 107 PID 3488 wrote to memory of 2820 3488 explorer.exe 107 PID 3488 wrote to memory of 2820 3488 explorer.exe 107 PID 3488 wrote to memory of 5044 3488 explorer.exe 108 PID 3488 wrote to memory of 5044 3488 explorer.exe 108 PID 3488 wrote to memory of 5044 3488 explorer.exe 108 PID 3488 wrote to memory of 4152 3488 explorer.exe 109 PID 3488 wrote to memory of 4152 3488 explorer.exe 109 PID 3488 wrote to memory of 4152 3488 explorer.exe 109 PID 3488 wrote to memory of 3852 3488 explorer.exe 110 PID 3488 wrote to memory of 3852 3488 explorer.exe 110 PID 3488 wrote to memory of 3852 3488 explorer.exe 110 PID 3488 wrote to memory of 2244 3488 explorer.exe 111 PID 3488 wrote to memory of 2244 3488 explorer.exe 111 PID 3488 wrote to memory of 2244 3488 explorer.exe 111 PID 3488 wrote to memory of 4252 3488 explorer.exe 112 PID 3488 wrote to memory of 4252 3488 explorer.exe 112 PID 3488 wrote to memory of 4252 3488 explorer.exe 112 PID 3488 wrote to memory of 3752 3488 explorer.exe 113 PID 3488 wrote to memory of 3752 3488 explorer.exe 113 PID 3488 wrote to memory of 3752 3488 explorer.exe 113 PID 3488 wrote to memory of 2620 3488 explorer.exe 114 PID 3488 wrote to memory of 2620 3488 explorer.exe 114 PID 3488 wrote to memory of 2620 3488 explorer.exe 114 PID 3488 wrote to memory of 3264 3488 explorer.exe 115 PID 3488 wrote to memory of 3264 3488 explorer.exe 115 PID 3488 wrote to memory of 3264 3488 explorer.exe 115 PID 3488 wrote to memory of 3384 3488 explorer.exe 116 PID 3488 wrote to memory of 3384 3488 explorer.exe 116 PID 3488 wrote to memory of 3384 3488 explorer.exe 116 PID 3488 wrote to memory of 3092 3488 explorer.exe 117 PID 3488 wrote to memory of 3092 3488 explorer.exe 117 PID 3488 wrote to memory of 3092 3488 explorer.exe 117 PID 3488 wrote to memory of 2952 3488 explorer.exe 118 PID 3488 wrote to memory of 2952 3488 explorer.exe 118 PID 3488 wrote to memory of 2952 3488 explorer.exe 118 PID 3488 wrote to memory of 2380 3488 explorer.exe 119 PID 3488 wrote to memory of 2380 3488 explorer.exe 119 PID 3488 wrote to memory of 2380 3488 explorer.exe 119 PID 3488 wrote to memory of 3532 3488 explorer.exe 120 PID 3488 wrote to memory of 3532 3488 explorer.exe 120 PID 3488 wrote to memory of 3532 3488 explorer.exe 120 PID 3488 wrote to memory of 1448 3488 explorer.exe 121 PID 3488 wrote to memory of 1448 3488 explorer.exe 121 PID 3488 wrote to memory of 1448 3488 explorer.exe 121 PID 3488 wrote to memory of 8 3488 explorer.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b65a0a8742287b58b4a798b1a433ca69_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3604 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5172 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5560
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5768
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4152 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6072 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:6116 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5100
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3852 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6136 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5124 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1112
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3264 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5936 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3528
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2952 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5440
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:8 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5968 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4020 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5892
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2140 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1800 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1608 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5384
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5856 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2700 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4584
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5516 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5864 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3124 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4680
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4900 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:6084
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1384
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5388 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1792
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5144
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2308 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3604
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5792 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4848
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3180
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5728
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4396
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4240
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3628
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4460
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2652
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2776
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1212
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5116
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:6024 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1480
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4372
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4188
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2016
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1416
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5128
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6000
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6108
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2472
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3448
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5640
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5972
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3332
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3108
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:620
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5932
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2184
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3468
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5132
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5852
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3148,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5aadaa30b027fde38f4cd4bef0be455cb
SHA16c6615d57b319837ed8e4579d8c53bf42e818fa7
SHA256b61d4ab928cc534370de7d3da24e72f0822cd2d48c88c3dd0dda34e7995a8d10
SHA51235f6b1888e665240681c490a9b98b7fbfc0fd7f673baa6030397d9a28bd84f0deea7e6f5a2f341881bc185ba8e458ce22f617240b3db065de8bf925447ab325c
-
Filesize
2.2MB
MD5d813c8b53871081cc137042cc58d0b14
SHA147ef37d03b722c776855f10e2818a17432dda6fb
SHA2565ee6d0d976f95965e0eca25d16c972ca1f84dfb9aba507052ff8f683994bfbeb
SHA512bd0ce2d1debfc41b2650c11c8049db60e05ce783b6cebd181c878a93227531bfe8c44ad84640bfd1d03a31a1ff28eaa5d361feffcee9aa2d000c51ceba68c116