Analysis
-
max time kernel
127s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 17:48
Behavioral task
behavioral1
Sample
cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
cd4b30a91cab4fa43a5b7dfdc3c4f558
-
SHA1
9939243920aabad248274a7ce939307c5afa6b72
-
SHA256
ef2ef2e50c757985e8d1d55cf520f7c2ea950374c0456715e8ca74b18e57c7b1
-
SHA512
8b0e5397b6ce252c27158d9887d0b249a3e9b40a32f7323537e1ecd4d714bbbfe919c5248f27c5da574288d7b08c3c950e79e4cf941f94c71ab39b4f92daca20
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZV:0UzeyQMS4DqodCnoe+iitjWwwx
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2376 explorer.exe 4820 explorer.exe 3596 spoolsv.exe 2200 spoolsv.exe 4444 spoolsv.exe 2564 spoolsv.exe 3548 spoolsv.exe 3772 spoolsv.exe 1884 spoolsv.exe 3292 spoolsv.exe 5056 spoolsv.exe 1648 spoolsv.exe 4604 spoolsv.exe 1128 spoolsv.exe 4984 spoolsv.exe 3976 spoolsv.exe 1480 spoolsv.exe 3116 spoolsv.exe 4616 spoolsv.exe 3068 spoolsv.exe 4880 spoolsv.exe 4948 spoolsv.exe 3632 spoolsv.exe 1388 spoolsv.exe 3468 spoolsv.exe 3804 spoolsv.exe 2076 spoolsv.exe 1984 spoolsv.exe 4020 spoolsv.exe 2268 spoolsv.exe 1592 spoolsv.exe 3832 spoolsv.exe 2896 explorer.exe 4584 spoolsv.exe 3008 spoolsv.exe 1576 spoolsv.exe 4552 spoolsv.exe 4556 spoolsv.exe 5024 spoolsv.exe 2240 explorer.exe 4876 spoolsv.exe 1904 spoolsv.exe 5108 spoolsv.exe 4300 spoolsv.exe 3584 spoolsv.exe 3668 spoolsv.exe 2168 explorer.exe 1524 spoolsv.exe 2956 spoolsv.exe 1852 spoolsv.exe 4724 spoolsv.exe 4396 explorer.exe 2112 spoolsv.exe 1484 spoolsv.exe 1316 spoolsv.exe 2620 spoolsv.exe 3428 explorer.exe 4188 spoolsv.exe 2764 spoolsv.exe 2772 spoolsv.exe 4928 spoolsv.exe 1936 explorer.exe 4964 spoolsv.exe 3080 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 38 IoCs
description pid Process procid_target PID 3644 set thread context of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 2376 set thread context of 4820 2376 explorer.exe 101 PID 3596 set thread context of 3832 3596 spoolsv.exe 132 PID 2200 set thread context of 4584 2200 spoolsv.exe 134 PID 4444 set thread context of 3008 4444 spoolsv.exe 135 PID 2564 set thread context of 1576 2564 spoolsv.exe 136 PID 3548 set thread context of 4556 3548 spoolsv.exe 138 PID 3772 set thread context of 5024 3772 spoolsv.exe 139 PID 1884 set thread context of 4876 1884 spoolsv.exe 141 PID 3292 set thread context of 1904 3292 spoolsv.exe 142 PID 5056 set thread context of 4300 5056 spoolsv.exe 144 PID 1648 set thread context of 3584 1648 spoolsv.exe 145 PID 4604 set thread context of 3668 4604 spoolsv.exe 146 PID 1128 set thread context of 1524 1128 spoolsv.exe 148 PID 4984 set thread context of 1852 4984 spoolsv.exe 150 PID 3976 set thread context of 4724 3976 spoolsv.exe 151 PID 1480 set thread context of 2112 1480 spoolsv.exe 153 PID 3116 set thread context of 1316 3116 spoolsv.exe 155 PID 4616 set thread context of 2620 4616 spoolsv.exe 157 PID 3068 set thread context of 2764 3068 spoolsv.exe 160 PID 4880 set thread context of 2772 4880 spoolsv.exe 161 PID 4948 set thread context of 4928 4948 spoolsv.exe 162 PID 3632 set thread context of 4964 3632 spoolsv.exe 164 PID 1388 set thread context of 1860 1388 spoolsv.exe 166 PID 3468 set thread context of 3780 3468 spoolsv.exe 167 PID 3804 set thread context of 540 3804 spoolsv.exe 168 PID 2076 set thread context of 4532 2076 spoolsv.exe 170 PID 1984 set thread context of 4796 1984 spoolsv.exe 172 PID 4020 set thread context of 1176 4020 spoolsv.exe 173 PID 2268 set thread context of 1056 2268 spoolsv.exe 175 PID 1592 set thread context of 180 1592 spoolsv.exe 184 PID 2896 set thread context of 4704 2896 explorer.exe 187 PID 4552 set thread context of 5820 4552 spoolsv.exe 192 PID 2240 set thread context of 3300 2240 explorer.exe 195 PID 5108 set thread context of 5980 5108 spoolsv.exe 198 PID 2168 set thread context of 5440 2168 explorer.exe 201 PID 2956 set thread context of 5612 2956 spoolsv.exe 202 PID 4396 set thread context of 6016 4396 explorer.exe 205 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 4820 explorer.exe 3832 spoolsv.exe 3832 spoolsv.exe 4584 spoolsv.exe 4584 spoolsv.exe 3008 spoolsv.exe 3008 spoolsv.exe 1576 spoolsv.exe 1576 spoolsv.exe 4556 spoolsv.exe 4556 spoolsv.exe 5024 spoolsv.exe 5024 spoolsv.exe 4876 spoolsv.exe 4876 spoolsv.exe 1904 spoolsv.exe 1904 spoolsv.exe 4300 spoolsv.exe 4300 spoolsv.exe 3584 spoolsv.exe 3584 spoolsv.exe 3668 spoolsv.exe 3668 spoolsv.exe 1524 spoolsv.exe 1524 spoolsv.exe 1852 spoolsv.exe 1852 spoolsv.exe 4724 spoolsv.exe 4724 spoolsv.exe 2112 spoolsv.exe 2112 spoolsv.exe 1316 spoolsv.exe 1316 spoolsv.exe 2620 spoolsv.exe 2620 spoolsv.exe 2764 spoolsv.exe 2764 spoolsv.exe 2772 spoolsv.exe 2772 spoolsv.exe 4928 spoolsv.exe 4928 spoolsv.exe 4964 spoolsv.exe 4964 spoolsv.exe 1860 spoolsv.exe 1860 spoolsv.exe 3780 spoolsv.exe 3780 spoolsv.exe 540 spoolsv.exe 540 spoolsv.exe 4532 spoolsv.exe 4532 spoolsv.exe 4796 spoolsv.exe 4796 spoolsv.exe 1176 spoolsv.exe 1176 spoolsv.exe 1056 spoolsv.exe 1056 spoolsv.exe 180 spoolsv.exe 180 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 2856 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 84 PID 3644 wrote to memory of 2856 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 84 PID 3644 wrote to memory of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 3644 wrote to memory of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 3644 wrote to memory of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 3644 wrote to memory of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 3644 wrote to memory of 3652 3644 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 96 PID 3652 wrote to memory of 2376 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 97 PID 3652 wrote to memory of 2376 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 97 PID 3652 wrote to memory of 2376 3652 cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe 97 PID 2376 wrote to memory of 4820 2376 explorer.exe 101 PID 2376 wrote to memory of 4820 2376 explorer.exe 101 PID 2376 wrote to memory of 4820 2376 explorer.exe 101 PID 2376 wrote to memory of 4820 2376 explorer.exe 101 PID 2376 wrote to memory of 4820 2376 explorer.exe 101 PID 4820 wrote to memory of 3596 4820 explorer.exe 102 PID 4820 wrote to memory of 3596 4820 explorer.exe 102 PID 4820 wrote to memory of 3596 4820 explorer.exe 102 PID 4820 wrote to memory of 2200 4820 explorer.exe 103 PID 4820 wrote to memory of 2200 4820 explorer.exe 103 PID 4820 wrote to memory of 2200 4820 explorer.exe 103 PID 4820 wrote to memory of 4444 4820 explorer.exe 104 PID 4820 wrote to memory of 4444 4820 explorer.exe 104 PID 4820 wrote to memory of 4444 4820 explorer.exe 104 PID 4820 wrote to memory of 2564 4820 explorer.exe 105 PID 4820 wrote to memory of 2564 4820 explorer.exe 105 PID 4820 wrote to memory of 2564 4820 explorer.exe 105 PID 4820 wrote to memory of 3548 4820 explorer.exe 106 PID 4820 wrote to memory of 3548 4820 explorer.exe 106 PID 4820 wrote to memory of 3548 4820 explorer.exe 106 PID 4820 wrote to memory of 3772 4820 explorer.exe 107 PID 4820 wrote to memory of 3772 4820 explorer.exe 107 PID 4820 wrote to memory of 3772 4820 explorer.exe 107 PID 4820 wrote to memory of 1884 4820 explorer.exe 108 PID 4820 wrote to memory of 1884 4820 explorer.exe 108 PID 4820 wrote to memory of 1884 4820 explorer.exe 108 PID 4820 wrote to memory of 3292 4820 explorer.exe 109 PID 4820 wrote to memory of 3292 4820 explorer.exe 109 PID 4820 wrote to memory of 3292 4820 explorer.exe 109 PID 4820 wrote to memory of 5056 4820 explorer.exe 110 PID 4820 wrote to memory of 5056 4820 explorer.exe 110 PID 4820 wrote to memory of 5056 4820 explorer.exe 110 PID 4820 wrote to memory of 1648 4820 explorer.exe 111 PID 4820 wrote to memory of 1648 4820 explorer.exe 111 PID 4820 wrote to memory of 1648 4820 explorer.exe 111 PID 4820 wrote to memory of 4604 4820 explorer.exe 113 PID 4820 wrote to memory of 4604 4820 explorer.exe 113 PID 4820 wrote to memory of 4604 4820 explorer.exe 113 PID 4820 wrote to memory of 1128 4820 explorer.exe 114 PID 4820 wrote to memory of 1128 4820 explorer.exe 114 PID 4820 wrote to memory of 1128 4820 explorer.exe 114 PID 4820 wrote to memory of 4984 4820 explorer.exe 115 PID 4820 wrote to memory of 4984 4820 explorer.exe 115 PID 4820 wrote to memory of 4984 4820 explorer.exe 115 PID 4820 wrote to memory of 3976 4820 explorer.exe 116 PID 4820 wrote to memory of 3976 4820 explorer.exe 116 PID 4820 wrote to memory of 3976 4820 explorer.exe 116 PID 4820 wrote to memory of 1480 4820 explorer.exe 117 PID 4820 wrote to memory of 1480 4820 explorer.exe 117 PID 4820 wrote to memory of 1480 4820 explorer.exe 117 PID 4820 wrote to memory of 3116 4820 explorer.exe 118 PID 4820 wrote to memory of 3116 4820 explorer.exe 118 PID 4820 wrote to memory of 3116 4820 explorer.exe 118 PID 4820 wrote to memory of 4616 4820 explorer.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd4b30a91cab4fa43a5b7dfdc3c4f558_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3832 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4704
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4444 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5024 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2240 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3300
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1648 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3668 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2168 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5440
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4724 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4396 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:6016
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3428 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:6012
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4928 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1936 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5760
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1388 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3780
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4532 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1052 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:6008
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1056 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4456 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5144
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:180 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4356 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1096
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5820 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5864 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4628
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6040
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5612 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5676
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5216
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5860
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5432
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3080 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5964
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6032
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4440 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5412
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5448
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:956
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5192 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2216
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4804
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:6132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1848
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5580 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5172
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5256
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4940
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3404
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1236
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4980
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4436
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD50c5edf0affe6fb4c8e202fa4087cecbf
SHA176b4e6f3a0664c301161b871fbc616f81dde0785
SHA256b4843874b52f4ec2a05202f6c15bb4c967b259b814e1a8e51dc1dcc8a5bd5cb3
SHA512ec881516f0ebbccd7ffe38894b659b124a6ea41565a178776649b48f0490323ac8d037f66a0765fcfed93d9ed934d05ae7db176f848138fb5ac24939d167cf75
-
Filesize
2.2MB
MD574ab4963edbb7240eedaa813185cc2cc
SHA120092336d76764c4139c25a78cab93c8211da34a
SHA25622db2826756fba42b7a6204d093cdd990b465e6a4c917292accab7fa3ab6afd2
SHA5124c269e40cf2fe0ca62d63246f834201f97242a8e5a107dfc55b47b25ab0016d9b3dba181d5c1253b0317ddffc94eb4ed4d0c7dfe18780d487029c882c17cee35