Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:10
Behavioral task
behavioral1
Sample
c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
c1fb33512aa2c9738ca38b96f6aca3bd
-
SHA1
2e8bfdf77a55d3a076f958da3915a7dbb9b5c824
-
SHA256
ad86afca8b6b193d6382875daa039e7a3391ec5b1c72f614879e96374d42fe5e
-
SHA512
ff11a178b8ced308b3e3ee6c60f55d33b38c26c97f6e3a8d1789641e53906568512c3ff68e34639a38cdb0ff072fdb69250f11831b4309054ebb6a66d438be75
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZO:0UzeyQMS4DqodCnoe+iitjWwwK
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe -
Executes dropped EXE 24 IoCs
pid Process 2572 explorer.exe 1732 explorer.exe 776 spoolsv.exe 1776 spoolsv.exe 784 spoolsv.exe 1148 spoolsv.exe 2960 spoolsv.exe 2484 spoolsv.exe 2796 spoolsv.exe 2604 spoolsv.exe 2192 spoolsv.exe 1632 spoolsv.exe 1552 spoolsv.exe 1232 spoolsv.exe 2620 spoolsv.exe 2284 spoolsv.exe 2884 spoolsv.exe 1936 spoolsv.exe 1688 spoolsv.exe 1056 spoolsv.exe 2124 spoolsv.exe 1712 spoolsv.exe 3060 spoolsv.exe 1372 spoolsv.exe -
Loads dropped DLL 46 IoCs
pid Process 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2072 set thread context of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2572 set thread context of 1732 2572 explorer.exe 34 -
Drops file in Windows directory 26 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe 1732 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2444 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2444 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2444 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2444 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2712 2072 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 32 PID 2712 wrote to memory of 2572 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 33 PID 2712 wrote to memory of 2572 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 33 PID 2712 wrote to memory of 2572 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 33 PID 2712 wrote to memory of 2572 2712 c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe 33 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 2572 wrote to memory of 1732 2572 explorer.exe 34 PID 1732 wrote to memory of 776 1732 explorer.exe 35 PID 1732 wrote to memory of 776 1732 explorer.exe 35 PID 1732 wrote to memory of 776 1732 explorer.exe 35 PID 1732 wrote to memory of 776 1732 explorer.exe 35 PID 1732 wrote to memory of 1776 1732 explorer.exe 36 PID 1732 wrote to memory of 1776 1732 explorer.exe 36 PID 1732 wrote to memory of 1776 1732 explorer.exe 36 PID 1732 wrote to memory of 1776 1732 explorer.exe 36 PID 1732 wrote to memory of 784 1732 explorer.exe 37 PID 1732 wrote to memory of 784 1732 explorer.exe 37 PID 1732 wrote to memory of 784 1732 explorer.exe 37 PID 1732 wrote to memory of 784 1732 explorer.exe 37 PID 1732 wrote to memory of 1148 1732 explorer.exe 38 PID 1732 wrote to memory of 1148 1732 explorer.exe 38 PID 1732 wrote to memory of 1148 1732 explorer.exe 38 PID 1732 wrote to memory of 1148 1732 explorer.exe 38 PID 1732 wrote to memory of 2960 1732 explorer.exe 39 PID 1732 wrote to memory of 2960 1732 explorer.exe 39 PID 1732 wrote to memory of 2960 1732 explorer.exe 39 PID 1732 wrote to memory of 2960 1732 explorer.exe 39 PID 1732 wrote to memory of 2484 1732 explorer.exe 40 PID 1732 wrote to memory of 2484 1732 explorer.exe 40 PID 1732 wrote to memory of 2484 1732 explorer.exe 40 PID 1732 wrote to memory of 2484 1732 explorer.exe 40 PID 1732 wrote to memory of 2796 1732 explorer.exe 41 PID 1732 wrote to memory of 2796 1732 explorer.exe 41 PID 1732 wrote to memory of 2796 1732 explorer.exe 41 PID 1732 wrote to memory of 2796 1732 explorer.exe 41 PID 1732 wrote to memory of 2604 1732 explorer.exe 42 PID 1732 wrote to memory of 2604 1732 explorer.exe 42 PID 1732 wrote to memory of 2604 1732 explorer.exe 42 PID 1732 wrote to memory of 2604 1732 explorer.exe 42 PID 1732 wrote to memory of 2192 1732 explorer.exe 43 PID 1732 wrote to memory of 2192 1732 explorer.exe 43 PID 1732 wrote to memory of 2192 1732 explorer.exe 43 PID 1732 wrote to memory of 2192 1732 explorer.exe 43 PID 1732 wrote to memory of 1632 1732 explorer.exe 44 PID 1732 wrote to memory of 1632 1732 explorer.exe 44 PID 1732 wrote to memory of 1632 1732 explorer.exe 44 PID 1732 wrote to memory of 1632 1732 explorer.exe 44 PID 1732 wrote to memory of 1552 1732 explorer.exe 45 PID 1732 wrote to memory of 1552 1732 explorer.exe 45 PID 1732 wrote to memory of 1552 1732 explorer.exe 45 PID 1732 wrote to memory of 1552 1732 explorer.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1fb33512aa2c9738ca38b96f6aca3bd_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1480
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1740
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:784 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1148 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3684
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3812
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2796 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2496
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2192
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1632
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1552
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:928
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1268
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1056
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2124
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1712
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1372
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2184
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2812
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1508
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2768
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1848
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2012
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2944
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1528
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3164
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2664
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2028
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2312
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1224
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2976
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:880
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:948
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1020
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:840
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1832
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1096
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2528
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2972
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2908
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1988
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1348
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1644
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:432
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1840
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1380
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3056
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1100
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2288
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2720
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD59e74bb08ca04e2278d8060448ae1fd18
SHA177585b42a37906e8e83a7d4218d5243819bbf861
SHA256554b4b7416e7161b3661d066b5dcf64e0179be0c9a7edf4045b65d0d55188b35
SHA512df63ed19c0bca15c78776daa2f783d6a96d74c84ea712e2d947bcff781449f1e659b274847d122f6acd00739194478533e22ece94cff990965866828aadd2e94
-
Filesize
2.2MB
MD507f8bb778c97775a17a0932ad9117107
SHA179d5a45d48b9c58624a8e3177b34f88b2bef5d32
SHA25604c9a48f72d5a390f31ab0c1bfe51f468081635d9cc6cec265cc53e25fcf4db2
SHA512b1ac498a498e652cff3c284b918e615e8979a92df215e0cb6e9a3f0ba583b0089a8ac3f705afd009acfbc7dae7971238b14580ad8822da7646a9f9d5d8928f19