Analysis
-
max time kernel
106s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 08:18
Behavioral task
behavioral1
Sample
ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
ca7adc30304ec8a250b4ed2e482f59ba
-
SHA1
e872bedcb8602bfe42382a7f288aa9af6aa74cbc
-
SHA256
7a85c69b8d5cb59fface6094bedd711ba792e891d22cae71c5674720d00a0d76
-
SHA512
c422f5306b478de86596786ba4de0932767cf3942fe3a1f2b554d82f71d374f020ee97ac37474dc9d1d70ab6ac036d27b88fe589c8d38a31cb7b6f9cc8c9aa72
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZN:0UzeyQMS4DqodCnoe+iitjWwwB
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe -
Executes dropped EXE 61 IoCs
pid Process 3352 explorer.exe 1596 explorer.exe 824 spoolsv.exe 3928 spoolsv.exe 3376 spoolsv.exe 452 spoolsv.exe 2796 spoolsv.exe 3372 spoolsv.exe 4684 spoolsv.exe 3952 spoolsv.exe 3800 spoolsv.exe 4212 spoolsv.exe 940 spoolsv.exe 2576 spoolsv.exe 2172 spoolsv.exe 3628 spoolsv.exe 2972 spoolsv.exe 3084 spoolsv.exe 3604 spoolsv.exe 3884 spoolsv.exe 2808 spoolsv.exe 4376 spoolsv.exe 3052 spoolsv.exe 1216 spoolsv.exe 4240 spoolsv.exe 4952 spoolsv.exe 4836 explorer.exe 3140 spoolsv.exe 184 spoolsv.exe 3016 spoolsv.exe 2844 explorer.exe 640 spoolsv.exe 5476 spoolsv.exe 5536 spoolsv.exe 5832 spoolsv.exe 5888 explorer.exe 556 spoolsv.exe 5576 spoolsv.exe 5632 spoolsv.exe 5680 explorer.exe 5976 spoolsv.exe 5820 spoolsv.exe 5156 explorer.exe 5472 spoolsv.exe 1652 spoolsv.exe 5900 spoolsv.exe 748 explorer.exe 4548 spoolsv.exe 5064 spoolsv.exe 5824 spoolsv.exe 1264 explorer.exe 6044 spoolsv.exe 5396 spoolsv.exe 5616 spoolsv.exe 1976 spoolsv.exe 772 explorer.exe 4844 spoolsv.exe 4708 spoolsv.exe 5956 spoolsv.exe 4720 spoolsv.exe 6124 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2844 set thread context of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 3352 set thread context of 1596 3352 explorer.exe 107 PID 824 set thread context of 4952 824 spoolsv.exe 132 PID 3928 set thread context of 3140 3928 spoolsv.exe 134 PID 3376 set thread context of 3016 3376 spoolsv.exe 136 PID 452 set thread context of 640 452 spoolsv.exe 138 PID 2796 set thread context of 5536 2796 spoolsv.exe 140 PID 3372 set thread context of 5832 3372 spoolsv.exe 141 PID 4684 set thread context of 5632 4684 spoolsv.exe 145 PID 3952 set thread context of 5820 3952 spoolsv.exe 148 PID 3800 set thread context of 1652 3800 spoolsv.exe 151 PID 4212 set thread context of 5900 4212 spoolsv.exe 153 PID 940 set thread context of 5064 940 spoolsv.exe 156 PID 2576 set thread context of 6044 2576 spoolsv.exe 159 PID 2172 set thread context of 1976 2172 spoolsv.exe 162 PID 3628 set thread context of 4844 3628 spoolsv.exe 164 PID 2972 set thread context of 4720 2972 spoolsv.exe 167 -
Drops file in Windows directory 47 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 1596 explorer.exe 4952 spoolsv.exe 4952 spoolsv.exe 3140 spoolsv.exe 3140 spoolsv.exe 3016 spoolsv.exe 3016 spoolsv.exe 640 spoolsv.exe 640 spoolsv.exe 5536 spoolsv.exe 5536 spoolsv.exe 5832 spoolsv.exe 5832 spoolsv.exe 5632 spoolsv.exe 5632 spoolsv.exe 5820 spoolsv.exe 5820 spoolsv.exe 1652 spoolsv.exe 1652 spoolsv.exe 5900 spoolsv.exe 5900 spoolsv.exe 5064 spoolsv.exe 5064 spoolsv.exe 6044 spoolsv.exe 6044 spoolsv.exe 1976 spoolsv.exe 1976 spoolsv.exe 4844 spoolsv.exe 4844 spoolsv.exe 4720 spoolsv.exe 4720 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3968 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 89 PID 2844 wrote to memory of 3968 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 89 PID 2844 wrote to memory of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 2844 wrote to memory of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 2844 wrote to memory of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 2844 wrote to memory of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 2844 wrote to memory of 2028 2844 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 102 PID 2028 wrote to memory of 3352 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 103 PID 2028 wrote to memory of 3352 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 103 PID 2028 wrote to memory of 3352 2028 ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe 103 PID 3352 wrote to memory of 1596 3352 explorer.exe 107 PID 3352 wrote to memory of 1596 3352 explorer.exe 107 PID 3352 wrote to memory of 1596 3352 explorer.exe 107 PID 3352 wrote to memory of 1596 3352 explorer.exe 107 PID 3352 wrote to memory of 1596 3352 explorer.exe 107 PID 1596 wrote to memory of 824 1596 explorer.exe 108 PID 1596 wrote to memory of 824 1596 explorer.exe 108 PID 1596 wrote to memory of 824 1596 explorer.exe 108 PID 1596 wrote to memory of 3928 1596 explorer.exe 109 PID 1596 wrote to memory of 3928 1596 explorer.exe 109 PID 1596 wrote to memory of 3928 1596 explorer.exe 109 PID 1596 wrote to memory of 3376 1596 explorer.exe 110 PID 1596 wrote to memory of 3376 1596 explorer.exe 110 PID 1596 wrote to memory of 3376 1596 explorer.exe 110 PID 1596 wrote to memory of 452 1596 explorer.exe 111 PID 1596 wrote to memory of 452 1596 explorer.exe 111 PID 1596 wrote to memory of 452 1596 explorer.exe 111 PID 1596 wrote to memory of 2796 1596 explorer.exe 112 PID 1596 wrote to memory of 2796 1596 explorer.exe 112 PID 1596 wrote to memory of 2796 1596 explorer.exe 112 PID 1596 wrote to memory of 3372 1596 explorer.exe 114 PID 1596 wrote to memory of 3372 1596 explorer.exe 114 PID 1596 wrote to memory of 3372 1596 explorer.exe 114 PID 1596 wrote to memory of 4684 1596 explorer.exe 115 PID 1596 wrote to memory of 4684 1596 explorer.exe 115 PID 1596 wrote to memory of 4684 1596 explorer.exe 115 PID 1596 wrote to memory of 3952 1596 explorer.exe 116 PID 1596 wrote to memory of 3952 1596 explorer.exe 116 PID 1596 wrote to memory of 3952 1596 explorer.exe 116 PID 1596 wrote to memory of 3800 1596 explorer.exe 117 PID 1596 wrote to memory of 3800 1596 explorer.exe 117 PID 1596 wrote to memory of 3800 1596 explorer.exe 117 PID 1596 wrote to memory of 4212 1596 explorer.exe 118 PID 1596 wrote to memory of 4212 1596 explorer.exe 118 PID 1596 wrote to memory of 4212 1596 explorer.exe 118 PID 1596 wrote to memory of 940 1596 explorer.exe 119 PID 1596 wrote to memory of 940 1596 explorer.exe 119 PID 1596 wrote to memory of 940 1596 explorer.exe 119 PID 1596 wrote to memory of 2576 1596 explorer.exe 120 PID 1596 wrote to memory of 2576 1596 explorer.exe 120 PID 1596 wrote to memory of 2576 1596 explorer.exe 120 PID 1596 wrote to memory of 2172 1596 explorer.exe 121 PID 1596 wrote to memory of 2172 1596 explorer.exe 121 PID 1596 wrote to memory of 2172 1596 explorer.exe 121 PID 1596 wrote to memory of 3628 1596 explorer.exe 122 PID 1596 wrote to memory of 3628 1596 explorer.exe 122 PID 1596 wrote to memory of 3628 1596 explorer.exe 122 PID 1596 wrote to memory of 2972 1596 explorer.exe 123 PID 1596 wrote to memory of 2972 1596 explorer.exe 123 PID 1596 wrote to memory of 2972 1596 explorer.exe 123 PID 1596 wrote to memory of 3084 1596 explorer.exe 124 PID 1596 wrote to memory of 3084 1596 explorer.exe 124 PID 1596 wrote to memory of 3084 1596 explorer.exe 124 PID 1596 wrote to memory of 3604 1596 explorer.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca7adc30304ec8a250b4ed2e482f59ba_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:824 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4952 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4836 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1588
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3928 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3140
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3016 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2844 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5600
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:640
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2796 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5832 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5888 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5280
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5632 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5680 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4516
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3952 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5820 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5156 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5412
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3800 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5900 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:748 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5740
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5064 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1264 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5724
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2172 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1976 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:772 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3548
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4720 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6124 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5348
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5492
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2404
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5640
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3536
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4636
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5236
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5264
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5460
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5756
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5376
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3096
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5288
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4240 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4152
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5988
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4972
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:184 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:880
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3432
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4584
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2612
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4380
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5576 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5472 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5852
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1880
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5824 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5344
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5196
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4708 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1356
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:764
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2224
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2888
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5360
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5368
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4168
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5608
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:816
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5732
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1092
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5692
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5560
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2728
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5552
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4512
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5148
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5636
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5620
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4660
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5524
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5168
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4848
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4788
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5292
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6076
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5804
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6120
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:81⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5e2dc220fe802c5690418862056c18c4c
SHA12a042c89a57f1971dd7e29f6e5525d7ef4223d02
SHA2565405d41bb502594622e76a9316498161c14d04716b49f033994fb8c75ded2e36
SHA512a9fca34823e3440a770476cd24c2e8499e96df7f4531bf6bfe75642a996c08cdeada8635b4a6e57a8e7257a2cf1942b684402b0485dca4d084d58f3519c61168
-
Filesize
2.2MB
MD5f3a33d488e784ccec8b354b38bae6077
SHA184b8ba328dc6ba5e511b21e8ef5c490b9dfb15f7
SHA256049f368af02f2cea230e958d7a4f4e01b294e1de109316edd5282ecb973e3913
SHA512a92f42d73b9dab0be0dba220f08aa3e4767aeb5b9876912a034cc45788cf9c242ff0b94befa30961054e1eaffd917192f3cb419917be65814da82357f26ce8e4