Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe
-
Size
273KB
-
MD5
ba23e051091480c533eb482ff49ebc0e
-
SHA1
b82668bfee84196c5c829c8ec737c12b8c16a213
-
SHA256
73201834b1e50cb3d4468938b1d7e1c44098de86271cb2859aaea4741012e448
-
SHA512
928e40141132127663f92e5500a98245be5cf6c370110e514070aeb959a42b2e5bd4be53b0ecff7977ec298634e1e9977c6973f87efd2a0bcd9b9e70662d3b03
-
SSDEEP
6144:irAI/sHAeQFp9cgFa8MrVg9yGVvEF0CgckbVPyBS6ABkJyyC01:gAI/slJC9ywE0Nc0FyI6Skwh0
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2888 spools.exe 2700 spools.exe 2524 spools.exe 2584 spools.exe 2508 spools.exe 2268 spools.exe 1332 spools.exe 2908 spools.exe 2848 spools.exe 1704 spools.exe 2292 spools.exe 2720 spools.exe 1876 spools.exe 3044 spools.exe 2176 spools.exe 1616 spools.exe 580 spools.exe 1088 spools.exe 1400 spools.exe 1612 spools.exe 1660 spools.exe 1048 spools.exe 1784 spools.exe 1292 spools.exe 884 spools.exe 1644 spools.exe 2320 spools.exe 2660 spools.exe 2884 spools.exe 2752 spools.exe 2564 spools.exe 2796 spools.exe 2464 spools.exe 2060 spools.exe 1964 spools.exe 2840 spools.exe 588 spools.exe 2492 spools.exe 2024 spools.exe 2092 spools.exe 1484 spools.exe 1608 spools.exe 2404 spools.exe 3008 spools.exe 1564 spools.exe 2272 spools.exe 880 spools.exe 1592 spools.exe 2852 spools.exe 2656 spools.exe 2844 spools.exe 1380 spools.exe 2832 spools.exe 1576 spools.exe 328 spools.exe 2144 spools.exe 1492 spools.exe 924 spools.exe 800 spools.exe 1928 spools.exe 2748 spools.exe 668 spools.exe 1792 spools.exe 1944 spools.exe -
Loads dropped DLL 64 IoCs
pid Process 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe 2700 spools.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 2584 spools.exe 1040 WerFault.exe 1040 WerFault.exe 1040 WerFault.exe 1040 WerFault.exe 2268 spools.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2908 spools.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1704 spools.exe 788 WerFault.exe 788 WerFault.exe 788 WerFault.exe 788 WerFault.exe 2720 spools.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 3044 spools.exe 1452 WerFault.exe 1452 WerFault.exe 1452 WerFault.exe 1452 WerFault.exe 1616 spools.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 1088 spools.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1336 WerFault.exe 1612 spools.exe 2304 WerFault.exe 2304 WerFault.exe 2304 WerFault.exe 2304 WerFault.exe 1048 spools.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1292 spools.exe 1712 WerFault.exe 1712 WerFault.exe 1712 WerFault.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spools Service Controller = "C:\\Windows\\system32\\spools.exe" spools.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File created C:\Windows\SysWOW64\spools.exe spools.exe File opened for modification C:\Windows\SysWOW64\spools.exe spools.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2976 set thread context of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2888 set thread context of 2700 2888 spools.exe 33 PID 2524 set thread context of 2584 2524 spools.exe 36 PID 2508 set thread context of 2268 2508 spools.exe 39 PID 1332 set thread context of 2908 1332 spools.exe 42 PID 2848 set thread context of 1704 2848 spools.exe 45 PID 2292 set thread context of 2720 2292 spools.exe 48 PID 1876 set thread context of 3044 1876 spools.exe 51 PID 2176 set thread context of 1616 2176 spools.exe 54 PID 580 set thread context of 1088 580 spools.exe 57 PID 1400 set thread context of 1612 1400 spools.exe 60 PID 1660 set thread context of 1048 1660 spools.exe 63 PID 1784 set thread context of 1292 1784 spools.exe 66 PID 884 set thread context of 1644 884 spools.exe 69 PID 2320 set thread context of 2660 2320 spools.exe 72 PID 2884 set thread context of 2752 2884 spools.exe 75 PID 2564 set thread context of 2796 2564 spools.exe 78 PID 2464 set thread context of 2060 2464 spools.exe 81 PID 1964 set thread context of 2840 1964 spools.exe 84 PID 588 set thread context of 2492 588 spools.exe 87 PID 2024 set thread context of 2092 2024 spools.exe 90 PID 1484 set thread context of 1608 1484 spools.exe 93 PID 2404 set thread context of 3008 2404 spools.exe 96 PID 1564 set thread context of 2272 1564 spools.exe 99 PID 880 set thread context of 1592 880 spools.exe 102 PID 2852 set thread context of 2656 2852 spools.exe 105 PID 2844 set thread context of 1380 2844 spools.exe 108 PID 2832 set thread context of 1576 2832 spools.exe 111 PID 328 set thread context of 2144 328 spools.exe 114 PID 1492 set thread context of 924 1492 spools.exe 117 PID 800 set thread context of 1928 800 spools.exe 120 PID 2748 set thread context of 668 2748 spools.exe 123 PID 1792 set thread context of 1944 1792 spools.exe 126 PID 1976 set thread context of 1900 1976 spools.exe 129 PID 2044 set thread context of 2532 2044 spools.exe 132 PID 2340 set thread context of 2160 2340 spools.exe 135 PID 2680 set thread context of 1056 2680 spools.exe 138 PID 2548 set thread context of 840 2548 spools.exe 141 PID 624 set thread context of 484 624 spools.exe 144 PID 1676 set thread context of 3112 1676 spools.exe 147 PID 3176 set thread context of 3216 3176 spools.exe 150 PID 3284 set thread context of 3320 3284 spools.exe 153 PID 3384 set thread context of 3412 3384 spools.exe 156 PID 3476 set thread context of 3508 3476 spools.exe 159 PID 3572 set thread context of 3612 3572 spools.exe 162 PID 3676 set thread context of 3708 3676 spools.exe 165 PID 3776 set thread context of 3808 3776 spools.exe 168 PID 3872 set thread context of 3908 3872 spools.exe 171 PID 3972 set thread context of 4008 3972 spools.exe 174 PID 4072 set thread context of 708 4072 spools.exe 177 PID 3156 set thread context of 1808 3156 spools.exe 180 PID 3304 set thread context of 1472 3304 spools.exe 183 PID 3484 set thread context of 3528 3484 spools.exe 186 PID 3636 set thread context of 3672 3636 spools.exe 189 PID 3836 set thread context of 3888 3836 spools.exe 192 PID 4036 set thread context of 4068 4036 spools.exe 195 PID 3168 set thread context of 3292 3168 spools.exe 198 PID 3468 set thread context of 3420 3468 spools.exe 201 PID 3756 set thread context of 3916 3756 spools.exe 204 PID 3188 set thread context of 3348 3188 spools.exe 207 PID 3640 set thread context of 3788 3640 spools.exe 210 PID 3236 set thread context of 3768 3236 spools.exe 213 PID 1412 set thread context of 2348 1412 spools.exe 216 PID 2244 set thread context of 3160 2244 spools.exe 219 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2628 2976 WerFault.exe 29 2556 2888 WerFault.exe 32 1720 2524 WerFault.exe 35 1040 2508 WerFault.exe 38 2704 1332 WerFault.exe 41 1632 2848 WerFault.exe 44 788 2292 WerFault.exe 47 2164 1876 WerFault.exe 50 1452 2176 WerFault.exe 53 1536 580 WerFault.exe 56 1336 1400 WerFault.exe 59 2304 1660 WerFault.exe 62 1936 1784 WerFault.exe 65 1712 884 WerFault.exe 68 2784 2320 WerFault.exe 71 2560 2884 WerFault.exe 74 2960 2564 WerFault.exe 77 2376 2464 WerFault.exe 80 2860 1964 WerFault.exe 83 1896 588 WerFault.exe 86 2084 2024 WerFault.exe 89 980 1484 WerFault.exe 92 768 2404 WerFault.exe 95 2332 1564 WerFault.exe 98 1596 880 WerFault.exe 101 3016 2852 WerFault.exe 104 2856 2844 WerFault.exe 107 1908 2832 WerFault.exe 110 2936 328 WerFault.exe 113 1684 1492 WerFault.exe 116 776 800 WerFault.exe 119 448 2748 WerFault.exe 122 2140 1792 WerFault.exe 125 604 1976 WerFault.exe 128 1140 2044 WerFault.exe 131 1540 2340 WerFault.exe 134 2168 2680 WerFault.exe 137 1696 2548 WerFault.exe 140 1488 624 WerFault.exe 143 3124 1676 WerFault.exe 146 3228 3176 WerFault.exe 149 3340 3284 WerFault.exe 152 3424 3384 WerFault.exe 155 3520 3476 WerFault.exe 158 3624 3572 WerFault.exe 161 3728 3676 WerFault.exe 164 3820 3776 WerFault.exe 167 3928 3872 WerFault.exe 170 4020 3972 WerFault.exe 173 3096 4072 WerFault.exe 176 2444 3156 WerFault.exe 179 3376 3304 WerFault.exe 182 3552 3484 WerFault.exe 185 3716 3636 WerFault.exe 188 3920 3836 WerFault.exe 191 1924 4036 WerFault.exe 194 3336 3168 WerFault.exe 197 3664 3468 WerFault.exe 200 3984 3756 WerFault.exe 203 3328 3188 WerFault.exe 206 3852 3640 WerFault.exe 209 3536 3236 WerFault.exe 212 3828 1412 WerFault.exe 215 3620 2244 WerFault.exe 218 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe Token: SeDebugPrivilege 2700 spools.exe Token: SeDebugPrivilege 2584 spools.exe Token: SeDebugPrivilege 2268 spools.exe Token: SeDebugPrivilege 2908 spools.exe Token: SeDebugPrivilege 1704 spools.exe Token: SeDebugPrivilege 2720 spools.exe Token: SeDebugPrivilege 3044 spools.exe Token: SeDebugPrivilege 1616 spools.exe Token: SeDebugPrivilege 1088 spools.exe Token: SeDebugPrivilege 1612 spools.exe Token: SeDebugPrivilege 1048 spools.exe Token: SeDebugPrivilege 1292 spools.exe Token: SeDebugPrivilege 1644 spools.exe Token: SeDebugPrivilege 2660 spools.exe Token: SeDebugPrivilege 2752 spools.exe Token: SeDebugPrivilege 2796 spools.exe Token: SeDebugPrivilege 2060 spools.exe Token: SeDebugPrivilege 2840 spools.exe Token: SeDebugPrivilege 2492 spools.exe Token: SeDebugPrivilege 2092 spools.exe Token: SeDebugPrivilege 1608 spools.exe Token: SeDebugPrivilege 3008 spools.exe Token: SeDebugPrivilege 2272 spools.exe Token: SeDebugPrivilege 1592 spools.exe Token: SeDebugPrivilege 2656 spools.exe Token: SeDebugPrivilege 1380 spools.exe Token: SeDebugPrivilege 1576 spools.exe Token: SeDebugPrivilege 2144 spools.exe Token: SeDebugPrivilege 924 spools.exe Token: SeDebugPrivilege 1928 spools.exe Token: SeDebugPrivilege 668 spools.exe Token: SeDebugPrivilege 1944 spools.exe Token: SeDebugPrivilege 1900 spools.exe Token: SeDebugPrivilege 2532 spools.exe Token: SeDebugPrivilege 2160 spools.exe Token: SeDebugPrivilege 1056 spools.exe Token: SeDebugPrivilege 840 spools.exe Token: SeDebugPrivilege 484 spools.exe Token: SeDebugPrivilege 3112 spools.exe Token: SeDebugPrivilege 3216 spools.exe Token: SeDebugPrivilege 3320 spools.exe Token: SeDebugPrivilege 3412 spools.exe Token: SeDebugPrivilege 3508 spools.exe Token: SeDebugPrivilege 3612 spools.exe Token: SeDebugPrivilege 3708 spools.exe Token: SeDebugPrivilege 3808 spools.exe Token: SeDebugPrivilege 3908 spools.exe Token: SeDebugPrivilege 4008 spools.exe Token: SeDebugPrivilege 708 spools.exe Token: SeDebugPrivilege 1808 spools.exe Token: SeDebugPrivilege 1472 spools.exe Token: SeDebugPrivilege 3528 spools.exe Token: SeDebugPrivilege 3672 spools.exe Token: SeDebugPrivilege 3888 spools.exe Token: SeDebugPrivilege 4068 spools.exe Token: SeDebugPrivilege 3292 spools.exe Token: SeDebugPrivilege 3420 spools.exe Token: SeDebugPrivilege 3916 spools.exe Token: SeDebugPrivilege 3348 spools.exe Token: SeDebugPrivilege 3788 spools.exe Token: SeDebugPrivilege 3768 spools.exe Token: SeDebugPrivilege 2348 spools.exe Token: SeDebugPrivilege 3160 spools.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2132 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2628 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 31 PID 2976 wrote to memory of 2628 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 31 PID 2976 wrote to memory of 2628 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 31 PID 2976 wrote to memory of 2628 2976 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2888 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2888 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2888 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2888 2132 ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe 32 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2700 2888 spools.exe 33 PID 2888 wrote to memory of 2556 2888 spools.exe 34 PID 2888 wrote to memory of 2556 2888 spools.exe 34 PID 2888 wrote to memory of 2556 2888 spools.exe 34 PID 2888 wrote to memory of 2556 2888 spools.exe 34 PID 2700 wrote to memory of 2524 2700 spools.exe 35 PID 2700 wrote to memory of 2524 2700 spools.exe 35 PID 2700 wrote to memory of 2524 2700 spools.exe 35 PID 2700 wrote to memory of 2524 2700 spools.exe 35 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 2584 2524 spools.exe 36 PID 2524 wrote to memory of 1720 2524 spools.exe 37 PID 2524 wrote to memory of 1720 2524 spools.exe 37 PID 2524 wrote to memory of 1720 2524 spools.exe 37 PID 2524 wrote to memory of 1720 2524 spools.exe 37 PID 2584 wrote to memory of 2508 2584 spools.exe 38 PID 2584 wrote to memory of 2508 2584 spools.exe 38 PID 2584 wrote to memory of 2508 2584 spools.exe 38 PID 2584 wrote to memory of 2508 2584 spools.exe 38 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 2268 2508 spools.exe 39 PID 2508 wrote to memory of 1040 2508 spools.exe 40 PID 2508 wrote to memory of 1040 2508 spools.exe 40 PID 2508 wrote to memory of 1040 2508 spools.exe 40 PID 2508 wrote to memory of 1040 2508 spools.exe 40 PID 2268 wrote to memory of 1332 2268 spools.exe 41 PID 2268 wrote to memory of 1332 2268 spools.exe 41 PID 2268 wrote to memory of 1332 2268 spools.exe 41 PID 2268 wrote to memory of 1332 2268 spools.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba23e051091480c533eb482ff49ebc0e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2848 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1876 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2176 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:580 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1400 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1784 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:884 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2884 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"40⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2024 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"44⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"46⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:880 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2844 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"56⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:328 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2748 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"66⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"67⤵
- Suspicious use of SetThreadContext
PID:1976 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"68⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"70⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"72⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"75⤵
- Suspicious use of SetThreadContext
PID:2548 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"76⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"77⤵
- Suspicious use of SetThreadContext
PID:624 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"78⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:484 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"80⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"81⤵
- Suspicious use of SetThreadContext
PID:3176 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"82⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"83⤵
- Suspicious use of SetThreadContext
PID:3284 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"84⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"86⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"87⤵
- Suspicious use of SetThreadContext
PID:3476 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"88⤵
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"89⤵
- Suspicious use of SetThreadContext
PID:3572 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"90⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"92⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3708 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"93⤵
- Suspicious use of SetThreadContext
PID:3776 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3808 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"95⤵
- Suspicious use of SetThreadContext
PID:3872 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"96⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"97⤵
- Suspicious use of SetThreadContext
PID:3972 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"98⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"100⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:708 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"103⤵
- Suspicious use of SetThreadContext
PID:3304 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"104⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"106⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3528 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"107⤵
- Suspicious use of SetThreadContext
PID:3636 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"108⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"109⤵
- Suspicious use of SetThreadContext
PID:3836 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"110⤵
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"111⤵
- Suspicious use of SetThreadContext
PID:4036 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"112⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4068 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"113⤵
- Suspicious use of SetThreadContext
PID:3168 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"114⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3292 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"115⤵
- Suspicious use of SetThreadContext
PID:3468 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"116⤵
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"117⤵
- Suspicious use of SetThreadContext
PID:3756 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"118⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"119⤵
- Suspicious use of SetThreadContext
PID:3188 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"120⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3348 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\system32\spools.exe"121⤵
- Suspicious use of SetThreadContext
PID:3640 -
C:\Windows\SysWOW64\spools.exe"C:\Windows\SysWOW64\spools.exe"122⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-