Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 17:11
Behavioral task
behavioral1
Sample
bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
bd70531cd37f5c948f98c41fbfcf43cd
-
SHA1
b88198a42dc903b1f1f2c06ee47f955fb9fd8a0b
-
SHA256
30c5d3d07cd91fca4aabee331beb086107de7d99b13b7d9e7ca6e0f55567b0bd
-
SHA512
d2bc2415f61af253356d4064400c50164c7115ab02fc8631a7f55caf7f9415f9eec8ea90cd942e98667c9ea5e875810c23c206e884a720714ac5ba56ab28bd93
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZC:0UzeyQMS4DqodCnoe+iitjWwwW
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4536 explorer.exe 700 explorer.exe 4452 spoolsv.exe 1664 spoolsv.exe 2604 spoolsv.exe 1188 spoolsv.exe 3312 spoolsv.exe 4980 spoolsv.exe 4828 spoolsv.exe 2920 spoolsv.exe 1660 spoolsv.exe 4536 spoolsv.exe 2880 spoolsv.exe 5012 spoolsv.exe 744 spoolsv.exe 1020 spoolsv.exe 216 spoolsv.exe 1636 spoolsv.exe 2628 spoolsv.exe 2588 spoolsv.exe 4220 spoolsv.exe 2212 spoolsv.exe 3724 spoolsv.exe 4968 spoolsv.exe 3660 spoolsv.exe 4436 spoolsv.exe 5044 spoolsv.exe 4720 spoolsv.exe 2744 spoolsv.exe 3524 spoolsv.exe 4556 spoolsv.exe 3580 spoolsv.exe 5020 spoolsv.exe 1600 explorer.exe 3012 spoolsv.exe 4596 spoolsv.exe 4236 spoolsv.exe 348 spoolsv.exe 2896 spoolsv.exe 4552 explorer.exe 3612 spoolsv.exe 4428 spoolsv.exe 4136 spoolsv.exe 3796 spoolsv.exe 4868 spoolsv.exe 3308 spoolsv.exe 1924 spoolsv.exe 2456 explorer.exe 4972 spoolsv.exe 396 spoolsv.exe 3564 spoolsv.exe 1960 spoolsv.exe 4416 spoolsv.exe 1964 explorer.exe 4680 spoolsv.exe 2620 spoolsv.exe 2180 spoolsv.exe 1348 spoolsv.exe 4960 spoolsv.exe 3284 spoolsv.exe 4924 explorer.exe 1120 spoolsv.exe 1732 spoolsv.exe 3156 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 54 IoCs
description pid Process procid_target PID 884 set thread context of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 4536 set thread context of 700 4536 explorer.exe 95 PID 4452 set thread context of 5020 4452 spoolsv.exe 126 PID 1664 set thread context of 3012 1664 spoolsv.exe 128 PID 2604 set thread context of 4596 2604 spoolsv.exe 129 PID 1188 set thread context of 4236 1188 spoolsv.exe 130 PID 3312 set thread context of 2896 3312 spoolsv.exe 132 PID 4980 set thread context of 3612 4980 spoolsv.exe 134 PID 4828 set thread context of 4428 4828 spoolsv.exe 135 PID 2920 set thread context of 4136 2920 spoolsv.exe 136 PID 1660 set thread context of 3796 1660 spoolsv.exe 137 PID 4536 set thread context of 3308 4536 spoolsv.exe 139 PID 2880 set thread context of 1924 2880 spoolsv.exe 140 PID 5012 set thread context of 4972 5012 spoolsv.exe 142 PID 744 set thread context of 396 744 spoolsv.exe 143 PID 1020 set thread context of 3564 1020 spoolsv.exe 144 PID 216 set thread context of 4416 216 spoolsv.exe 146 PID 1636 set thread context of 4680 1636 spoolsv.exe 148 PID 2628 set thread context of 2620 2628 spoolsv.exe 149 PID 2588 set thread context of 2180 2588 spoolsv.exe 150 PID 4220 set thread context of 1348 4220 spoolsv.exe 151 PID 2212 set thread context of 3284 2212 spoolsv.exe 153 PID 3724 set thread context of 1120 3724 spoolsv.exe 155 PID 4968 set thread context of 1732 4968 spoolsv.exe 156 PID 3660 set thread context of 3156 3660 spoolsv.exe 157 PID 4436 set thread context of 4568 4436 spoolsv.exe 159 PID 5044 set thread context of 1908 5044 spoolsv.exe 160 PID 4720 set thread context of 4932 4720 spoolsv.exe 162 PID 2744 set thread context of 5088 2744 spoolsv.exe 163 PID 3524 set thread context of 872 3524 spoolsv.exe 164 PID 4556 set thread context of 4748 4556 spoolsv.exe 166 PID 3580 set thread context of 448 3580 spoolsv.exe 170 PID 1600 set thread context of 3160 1600 explorer.exe 172 PID 348 set thread context of 1368 348 spoolsv.exe 176 PID 4552 set thread context of 3712 4552 explorer.exe 179 PID 4868 set thread context of 812 4868 spoolsv.exe 183 PID 2456 set thread context of 3888 2456 explorer.exe 185 PID 1964 set thread context of 1916 1964 explorer.exe 189 PID 1960 set thread context of 3652 1960 spoolsv.exe 190 PID 4960 set thread context of 4744 4960 spoolsv.exe 195 PID 4924 set thread context of 1136 4924 explorer.exe 197 PID 4428 set thread context of 2168 4428 spoolsv.exe 201 PID 1728 set thread context of 1592 1728 explorer.exe 202 PID 2764 set thread context of 2624 2764 spoolsv.exe 204 PID 732 set thread context of 1596 732 explorer.exe 205 PID 1696 set thread context of 5084 1696 spoolsv.exe 206 PID 208 set thread context of 4148 208 spoolsv.exe 208 PID 712 set thread context of 4888 712 explorer.exe 210 PID 1792 set thread context of 1572 1792 spoolsv.exe 211 PID 2768 set thread context of 2784 2768 spoolsv.exe 213 PID 4352 set thread context of 4916 4352 spoolsv.exe 215 PID 4272 set thread context of 4992 4272 spoolsv.exe 217 PID 1428 set thread context of 4872 1428 explorer.exe 219 PID 2504 set thread context of 4340 2504 spoolsv.exe 220 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 700 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 700 explorer.exe 5020 spoolsv.exe 5020 spoolsv.exe 3012 spoolsv.exe 3012 spoolsv.exe 4596 spoolsv.exe 4596 spoolsv.exe 4236 spoolsv.exe 4236 spoolsv.exe 2896 spoolsv.exe 2896 spoolsv.exe 3612 spoolsv.exe 3612 spoolsv.exe 4428 spoolsv.exe 4428 spoolsv.exe 4136 spoolsv.exe 4136 spoolsv.exe 3796 spoolsv.exe 3796 spoolsv.exe 3308 spoolsv.exe 3308 spoolsv.exe 1924 spoolsv.exe 1924 spoolsv.exe 4972 spoolsv.exe 4972 spoolsv.exe 396 spoolsv.exe 396 spoolsv.exe 3564 spoolsv.exe 3564 spoolsv.exe 4416 spoolsv.exe 4416 spoolsv.exe 4680 spoolsv.exe 4680 spoolsv.exe 2620 spoolsv.exe 2620 spoolsv.exe 2180 spoolsv.exe 2180 spoolsv.exe 1348 spoolsv.exe 1348 spoolsv.exe 3284 spoolsv.exe 3284 spoolsv.exe 1120 spoolsv.exe 1120 spoolsv.exe 1732 spoolsv.exe 1732 spoolsv.exe 3156 spoolsv.exe 3156 spoolsv.exe 4568 spoolsv.exe 4568 spoolsv.exe 1908 spoolsv.exe 1908 spoolsv.exe 4932 spoolsv.exe 4932 spoolsv.exe 5088 spoolsv.exe 5088 spoolsv.exe 872 spoolsv.exe 872 spoolsv.exe 4748 spoolsv.exe 4748 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 1092 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 81 PID 884 wrote to memory of 1092 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 81 PID 884 wrote to memory of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 884 wrote to memory of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 884 wrote to memory of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 884 wrote to memory of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 884 wrote to memory of 3152 884 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 86 PID 3152 wrote to memory of 4536 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 87 PID 3152 wrote to memory of 4536 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 87 PID 3152 wrote to memory of 4536 3152 bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe 87 PID 4536 wrote to memory of 700 4536 explorer.exe 95 PID 4536 wrote to memory of 700 4536 explorer.exe 95 PID 4536 wrote to memory of 700 4536 explorer.exe 95 PID 4536 wrote to memory of 700 4536 explorer.exe 95 PID 4536 wrote to memory of 700 4536 explorer.exe 95 PID 700 wrote to memory of 4452 700 explorer.exe 96 PID 700 wrote to memory of 4452 700 explorer.exe 96 PID 700 wrote to memory of 4452 700 explorer.exe 96 PID 700 wrote to memory of 1664 700 explorer.exe 97 PID 700 wrote to memory of 1664 700 explorer.exe 97 PID 700 wrote to memory of 1664 700 explorer.exe 97 PID 700 wrote to memory of 2604 700 explorer.exe 98 PID 700 wrote to memory of 2604 700 explorer.exe 98 PID 700 wrote to memory of 2604 700 explorer.exe 98 PID 700 wrote to memory of 1188 700 explorer.exe 99 PID 700 wrote to memory of 1188 700 explorer.exe 99 PID 700 wrote to memory of 1188 700 explorer.exe 99 PID 700 wrote to memory of 3312 700 explorer.exe 100 PID 700 wrote to memory of 3312 700 explorer.exe 100 PID 700 wrote to memory of 3312 700 explorer.exe 100 PID 700 wrote to memory of 4980 700 explorer.exe 101 PID 700 wrote to memory of 4980 700 explorer.exe 101 PID 700 wrote to memory of 4980 700 explorer.exe 101 PID 700 wrote to memory of 4828 700 explorer.exe 102 PID 700 wrote to memory of 4828 700 explorer.exe 102 PID 700 wrote to memory of 4828 700 explorer.exe 102 PID 700 wrote to memory of 2920 700 explorer.exe 103 PID 700 wrote to memory of 2920 700 explorer.exe 103 PID 700 wrote to memory of 2920 700 explorer.exe 103 PID 700 wrote to memory of 1660 700 explorer.exe 104 PID 700 wrote to memory of 1660 700 explorer.exe 104 PID 700 wrote to memory of 1660 700 explorer.exe 104 PID 700 wrote to memory of 4536 700 explorer.exe 105 PID 700 wrote to memory of 4536 700 explorer.exe 105 PID 700 wrote to memory of 4536 700 explorer.exe 105 PID 700 wrote to memory of 2880 700 explorer.exe 106 PID 700 wrote to memory of 2880 700 explorer.exe 106 PID 700 wrote to memory of 2880 700 explorer.exe 106 PID 700 wrote to memory of 5012 700 explorer.exe 107 PID 700 wrote to memory of 5012 700 explorer.exe 107 PID 700 wrote to memory of 5012 700 explorer.exe 107 PID 700 wrote to memory of 744 700 explorer.exe 108 PID 700 wrote to memory of 744 700 explorer.exe 108 PID 700 wrote to memory of 744 700 explorer.exe 108 PID 700 wrote to memory of 1020 700 explorer.exe 109 PID 700 wrote to memory of 1020 700 explorer.exe 109 PID 700 wrote to memory of 1020 700 explorer.exe 109 PID 700 wrote to memory of 216 700 explorer.exe 110 PID 700 wrote to memory of 216 700 explorer.exe 110 PID 700 wrote to memory of 216 700 explorer.exe 110 PID 700 wrote to memory of 1636 700 explorer.exe 111 PID 700 wrote to memory of 1636 700 explorer.exe 111 PID 700 wrote to memory of 1636 700 explorer.exe 111 PID 700 wrote to memory of 2628 700 explorer.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd70531cd37f5c948f98c41fbfcf43cd_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5020 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1600 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3160
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1664 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4552 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3712
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2920 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3888
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:744 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4416 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1964 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1916
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4680
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3284 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4924 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1136
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3724 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4968 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1908 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1728 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1592
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4720 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4932
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2744 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4748 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:732 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1596
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3580 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:712 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4888
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1368
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1428 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4872
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4868 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:812
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:60
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3652
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4564
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4744
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4880
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2168
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:5092
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2764 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1696 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:208 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4148
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1452
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:1792 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4916
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1512
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4340
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3812
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3964
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4372
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2396
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4908
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4376
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4620
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3120
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3276
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD573605da41745419da86c0d6e3563103e
SHA1df5c3e84f62515ace63d126c49f96bb046c85758
SHA25627603d6e89ca36db621cfdfdd97234df8346cd035be82306958e2c94c9589e64
SHA51212e98931f1d58ddec32efdb9a22d7b5a7e50d4165765258594ffbd90b0245d1798414ebd2f4f2f597298a06eaebfb29f498041bf6e8daf8cdd92207498866e25
-
Filesize
2.2MB
MD5ca9684f3c40aaf2ada24608a558bacd5
SHA1810892b9a288ef40d6fbef296422381e903ae25d
SHA2569451e223c36abc8e0021f9bb9424b1413afb3515cb90255720cb4c90548ff324
SHA51233adc5bcef2c48e7ac629d3855579d6ee94b2cfc131c9003b38ee514590eb9fd93dd7f075bf11a0f1343c244fc796808f58eb4c0ff87d55704091a13cc6459a9