Analysis
-
max time kernel
103s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 06:29
Behavioral task
behavioral1
Sample
c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
c85d9a2d898eca2425837228be86065b
-
SHA1
dfd992af501ff6c12868c808a11ca7f79a9f5448
-
SHA256
e94c6048c66133021f67a87cd1bc9ba6319165e4dc268d9af226ce602596fd46
-
SHA512
6ae4e3e9f6ee0ba89fa1d724adff24ae805d96caae143af141fcbf8f5a215cca11c10782f49ab6322c5fc13eac04424fad6928242c8408aa14f5af60054e32ad
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZI:0UzeyQMS4DqodCnoe+iitjWwws
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe -
Executes dropped EXE 59 IoCs
pid Process 2996 explorer.exe 1112 explorer.exe 2032 spoolsv.exe 4768 spoolsv.exe 4916 spoolsv.exe 4164 spoolsv.exe 3924 spoolsv.exe 1960 spoolsv.exe 4252 spoolsv.exe 1424 spoolsv.exe 5092 spoolsv.exe 1200 spoolsv.exe 3676 spoolsv.exe 2020 spoolsv.exe 3680 spoolsv.exe 4988 spoolsv.exe 3316 spoolsv.exe 4384 spoolsv.exe 1636 spoolsv.exe 3300 spoolsv.exe 2800 spoolsv.exe 4672 spoolsv.exe 1328 spoolsv.exe 1608 spoolsv.exe 688 spoolsv.exe 712 spoolsv.exe 4484 explorer.exe 2448 spoolsv.exe 5068 spoolsv.exe 5304 spoolsv.exe 5416 explorer.exe 5620 spoolsv.exe 5720 spoolsv.exe 5948 spoolsv.exe 2628 spoolsv.exe 5336 spoolsv.exe 5428 explorer.exe 2396 spoolsv.exe 5784 spoolsv.exe 5180 spoolsv.exe 5252 spoolsv.exe 5296 explorer.exe 5424 spoolsv.exe 6016 spoolsv.exe 4632 explorer.exe 5268 spoolsv.exe 5876 spoolsv.exe 5912 spoolsv.exe 5964 explorer.exe 3684 spoolsv.exe 4464 spoolsv.exe 5868 explorer.exe 4256 spoolsv.exe 6092 spoolsv.exe 396 explorer.exe 2676 spoolsv.exe 4316 spoolsv.exe 5464 spoolsv.exe 5864 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 4772 set thread context of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 2996 set thread context of 1112 2996 explorer.exe 109 PID 2032 set thread context of 712 2032 spoolsv.exe 134 PID 4768 set thread context of 5068 4768 spoolsv.exe 137 PID 4916 set thread context of 5304 4916 spoolsv.exe 138 PID 4164 set thread context of 5720 4164 spoolsv.exe 141 PID 3924 set thread context of 2628 3924 spoolsv.exe 143 PID 1960 set thread context of 5336 1960 spoolsv.exe 144 PID 4252 set thread context of 5784 4252 spoolsv.exe 147 PID 1424 set thread context of 5252 1424 spoolsv.exe 149 PID 5092 set thread context of 6016 5092 spoolsv.exe 152 PID 1200 set thread context of 5912 1200 spoolsv.exe 156 PID 3676 set thread context of 4464 3676 spoolsv.exe 159 PID 2020 set thread context of 6092 2020 spoolsv.exe 162 PID 3680 set thread context of 2676 3680 spoolsv.exe 165 PID 4988 set thread context of 5464 4988 spoolsv.exe 167 -
Drops file in Windows directory 46 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 61 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 712 spoolsv.exe 712 spoolsv.exe 5068 spoolsv.exe 5068 spoolsv.exe 5304 spoolsv.exe 5304 spoolsv.exe 5720 spoolsv.exe 5720 spoolsv.exe 2628 spoolsv.exe 2628 spoolsv.exe 5336 spoolsv.exe 5336 spoolsv.exe 5784 spoolsv.exe 5784 spoolsv.exe 5252 spoolsv.exe 5252 spoolsv.exe 6016 spoolsv.exe 6016 spoolsv.exe 5912 spoolsv.exe 5912 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 6092 spoolsv.exe 6092 spoolsv.exe 2676 spoolsv.exe 2676 spoolsv.exe 5464 spoolsv.exe 5464 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2108 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 91 PID 4772 wrote to memory of 2108 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 91 PID 4772 wrote to memory of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 4772 wrote to memory of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 4772 wrote to memory of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 4772 wrote to memory of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 4772 wrote to memory of 2568 4772 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 104 PID 2568 wrote to memory of 2996 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 105 PID 2568 wrote to memory of 2996 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 105 PID 2568 wrote to memory of 2996 2568 c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe 105 PID 2996 wrote to memory of 1112 2996 explorer.exe 109 PID 2996 wrote to memory of 1112 2996 explorer.exe 109 PID 2996 wrote to memory of 1112 2996 explorer.exe 109 PID 2996 wrote to memory of 1112 2996 explorer.exe 109 PID 2996 wrote to memory of 1112 2996 explorer.exe 109 PID 1112 wrote to memory of 2032 1112 explorer.exe 110 PID 1112 wrote to memory of 2032 1112 explorer.exe 110 PID 1112 wrote to memory of 2032 1112 explorer.exe 110 PID 1112 wrote to memory of 4768 1112 explorer.exe 111 PID 1112 wrote to memory of 4768 1112 explorer.exe 111 PID 1112 wrote to memory of 4768 1112 explorer.exe 111 PID 1112 wrote to memory of 4916 1112 explorer.exe 112 PID 1112 wrote to memory of 4916 1112 explorer.exe 112 PID 1112 wrote to memory of 4916 1112 explorer.exe 112 PID 1112 wrote to memory of 4164 1112 explorer.exe 113 PID 1112 wrote to memory of 4164 1112 explorer.exe 113 PID 1112 wrote to memory of 4164 1112 explorer.exe 113 PID 1112 wrote to memory of 3924 1112 explorer.exe 114 PID 1112 wrote to memory of 3924 1112 explorer.exe 114 PID 1112 wrote to memory of 3924 1112 explorer.exe 114 PID 1112 wrote to memory of 1960 1112 explorer.exe 115 PID 1112 wrote to memory of 1960 1112 explorer.exe 115 PID 1112 wrote to memory of 1960 1112 explorer.exe 115 PID 1112 wrote to memory of 4252 1112 explorer.exe 116 PID 1112 wrote to memory of 4252 1112 explorer.exe 116 PID 1112 wrote to memory of 4252 1112 explorer.exe 116 PID 1112 wrote to memory of 1424 1112 explorer.exe 117 PID 1112 wrote to memory of 1424 1112 explorer.exe 117 PID 1112 wrote to memory of 1424 1112 explorer.exe 117 PID 1112 wrote to memory of 5092 1112 explorer.exe 119 PID 1112 wrote to memory of 5092 1112 explorer.exe 119 PID 1112 wrote to memory of 5092 1112 explorer.exe 119 PID 1112 wrote to memory of 1200 1112 explorer.exe 120 PID 1112 wrote to memory of 1200 1112 explorer.exe 120 PID 1112 wrote to memory of 1200 1112 explorer.exe 120 PID 1112 wrote to memory of 3676 1112 explorer.exe 121 PID 1112 wrote to memory of 3676 1112 explorer.exe 121 PID 1112 wrote to memory of 3676 1112 explorer.exe 121 PID 1112 wrote to memory of 2020 1112 explorer.exe 122 PID 1112 wrote to memory of 2020 1112 explorer.exe 122 PID 1112 wrote to memory of 2020 1112 explorer.exe 122 PID 1112 wrote to memory of 3680 1112 explorer.exe 123 PID 1112 wrote to memory of 3680 1112 explorer.exe 123 PID 1112 wrote to memory of 3680 1112 explorer.exe 123 PID 1112 wrote to memory of 4988 1112 explorer.exe 124 PID 1112 wrote to memory of 4988 1112 explorer.exe 124 PID 1112 wrote to memory of 4988 1112 explorer.exe 124 PID 1112 wrote to memory of 3316 1112 explorer.exe 125 PID 1112 wrote to memory of 3316 1112 explorer.exe 125 PID 1112 wrote to memory of 3316 1112 explorer.exe 125 PID 1112 wrote to memory of 4384 1112 explorer.exe 126 PID 1112 wrote to memory of 4384 1112 explorer.exe 126 PID 1112 wrote to memory of 4384 1112 explorer.exe 126 PID 1112 wrote to memory of 1636 1112 explorer.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c85d9a2d898eca2425837228be86065b_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4484 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2112
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5304 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5416 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4520
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5720
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3924 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5336 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5428 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4840
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5252 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5296 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5196
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6016 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4632 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1388
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5912 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5964 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2628
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3676 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4464 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5868 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1936
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6092 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:396 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5744
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3680 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5464 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5864 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4048
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4440
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5792
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5376
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5348
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5544
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3772
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3300 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2800 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5232
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3868
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3232
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1100
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1328 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1604
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4300
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5960
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1608 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5516
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5588
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3052
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5240
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:792
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1940
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2908
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4132
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3904
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1288
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5284
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5132
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:628
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5928
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5972
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5664
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5220
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3436
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2456
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6004
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6128
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5308
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3828
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2928
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4340
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4832
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5300
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4948
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5292
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4996
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6084
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:464
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5408
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1040
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5404
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5580
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:60
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2460
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5524
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5812
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4964
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5192
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:652
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4684
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4224 /prefetch:81⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD53d8c6724664f1ff8818bebe044508b7f
SHA12a809608560355d8afa822a830385fe49e0fa150
SHA256cb76d92ff090ee892f39226ef928a5b6e532b23f547e125c11fdb3472b715a31
SHA51212c9c914799e10dd00a0a796c7928e71b4d7919dc7da4b7679a560f0f7e5f3f38312901799437a1ab32a9902aa1050a6fe296bfc2d488213cefe75b90d91f666
-
Filesize
2.2MB
MD565ff31327cbc20d349cccf15f414f89b
SHA1faec6f4dbfe88c8cc32cbbeb5ebc00ef6d0757fa
SHA256798dd61e61886d190aa6a53b2edc830b5829baafefbc967c6acea12d5b46968e
SHA51279d79b4121b769b547e307af9e8ea350170e6160fb2b93c0047bbe81514a208c0c58054acb20f58638f28cb28133abe8a34d07cd8deb5eae87eb727845610f6f