Analysis
-
max time kernel
117s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 14:18
Behavioral task
behavioral1
Sample
cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
cfba86a267a860d6ced7722d49bb7e64
-
SHA1
e46df8afd1367ac5fc66c9744b60a7bce63ff3be
-
SHA256
d14637397a452cc22b3d445b108160a6f3d4a92a3df058fcec7d9c9d450883c0
-
SHA512
464566aa23a108cd7f4c8cd3dbd821a6d4e8f4f75a359d3f82a4adc22bfe4ec80ffa10b6d6c840a340a7f04796868f82d74935c9bfbdb954a30567022520b970
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZl:0UzeyQMS4DqodCnoe+iitjWwwR
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3460 explorer.exe 3368 explorer.exe 2988 spoolsv.exe 1688 spoolsv.exe 4068 spoolsv.exe 1976 spoolsv.exe 2104 spoolsv.exe 3692 spoolsv.exe 3428 spoolsv.exe 3164 spoolsv.exe 648 spoolsv.exe 2872 spoolsv.exe 1872 spoolsv.exe 4944 spoolsv.exe 3772 spoolsv.exe 2268 spoolsv.exe 4352 spoolsv.exe 2436 spoolsv.exe 1612 spoolsv.exe 2484 spoolsv.exe 5104 spoolsv.exe 1160 spoolsv.exe 4416 spoolsv.exe 1032 spoolsv.exe 4788 spoolsv.exe 1476 spoolsv.exe 3360 spoolsv.exe 2132 spoolsv.exe 4564 spoolsv.exe 3028 spoolsv.exe 3040 spoolsv.exe 1232 explorer.exe 4832 spoolsv.exe 4528 spoolsv.exe 2160 spoolsv.exe 4320 spoolsv.exe 2900 spoolsv.exe 4828 explorer.exe 3668 spoolsv.exe 1224 spoolsv.exe 4436 spoolsv.exe 4472 spoolsv.exe 3548 explorer.exe 4028 spoolsv.exe 4160 spoolsv.exe 1364 spoolsv.exe 4392 spoolsv.exe 4808 explorer.exe 4736 spoolsv.exe 4616 spoolsv.exe 2660 spoolsv.exe 1228 spoolsv.exe 3344 explorer.exe 1452 spoolsv.exe 3848 spoolsv.exe 4532 spoolsv.exe 3436 explorer.exe 4328 spoolsv.exe 3528 spoolsv.exe 1508 spoolsv.exe 4764 spoolsv.exe 4480 explorer.exe 4260 spoolsv.exe 5052 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 31 IoCs
description pid Process procid_target PID 2248 set thread context of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 3460 set thread context of 3368 3460 explorer.exe 99 PID 2988 set thread context of 3040 2988 spoolsv.exe 128 PID 1688 set thread context of 4832 1688 spoolsv.exe 130 PID 4068 set thread context of 2160 4068 spoolsv.exe 132 PID 1976 set thread context of 4320 1976 spoolsv.exe 133 PID 2104 set thread context of 2900 2104 spoolsv.exe 134 PID 3692 set thread context of 3668 3692 spoolsv.exe 136 PID 3428 set thread context of 4436 3428 spoolsv.exe 138 PID 3164 set thread context of 4472 3164 spoolsv.exe 139 PID 648 set thread context of 4028 648 spoolsv.exe 141 PID 2872 set thread context of 1364 2872 spoolsv.exe 143 PID 1872 set thread context of 4392 1872 spoolsv.exe 144 PID 4944 set thread context of 4736 4944 spoolsv.exe 146 PID 3772 set thread context of 2660 3772 spoolsv.exe 148 PID 2268 set thread context of 1228 2268 spoolsv.exe 149 PID 4352 set thread context of 1452 4352 spoolsv.exe 151 PID 2436 set thread context of 4532 2436 spoolsv.exe 153 PID 1612 set thread context of 4328 1612 spoolsv.exe 155 PID 2484 set thread context of 3528 2484 spoolsv.exe 156 PID 5104 set thread context of 4764 5104 spoolsv.exe 158 PID 1160 set thread context of 4260 1160 spoolsv.exe 160 PID 4416 set thread context of 2576 4416 spoolsv.exe 162 PID 1032 set thread context of 2572 1032 spoolsv.exe 163 PID 4788 set thread context of 2656 4788 spoolsv.exe 165 PID 1476 set thread context of 2688 1476 spoolsv.exe 167 PID 3360 set thread context of 996 3360 spoolsv.exe 168 PID 2132 set thread context of 2936 2132 spoolsv.exe 170 PID 4564 set thread context of 2516 4564 spoolsv.exe 172 PID 3028 set thread context of 1516 3028 spoolsv.exe 176 PID 1232 set thread context of 924 1232 explorer.exe 180 -
Drops file in Windows directory 57 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3368 explorer.exe 3040 spoolsv.exe 3040 spoolsv.exe 4832 spoolsv.exe 4832 spoolsv.exe 2160 spoolsv.exe 2160 spoolsv.exe 4320 spoolsv.exe 4320 spoolsv.exe 2900 spoolsv.exe 2900 spoolsv.exe 3668 spoolsv.exe 3668 spoolsv.exe 4436 spoolsv.exe 4436 spoolsv.exe 4472 spoolsv.exe 4472 spoolsv.exe 4028 spoolsv.exe 4028 spoolsv.exe 1364 spoolsv.exe 1364 spoolsv.exe 4392 spoolsv.exe 4392 spoolsv.exe 4736 spoolsv.exe 4736 spoolsv.exe 2660 spoolsv.exe 2660 spoolsv.exe 1228 spoolsv.exe 1228 spoolsv.exe 1452 spoolsv.exe 1452 spoolsv.exe 4532 spoolsv.exe 4532 spoolsv.exe 4328 spoolsv.exe 4328 spoolsv.exe 3528 spoolsv.exe 3528 spoolsv.exe 4764 spoolsv.exe 4764 spoolsv.exe 4260 spoolsv.exe 4260 spoolsv.exe 2576 spoolsv.exe 2576 spoolsv.exe 2572 spoolsv.exe 2572 spoolsv.exe 2656 spoolsv.exe 2656 spoolsv.exe 2688 spoolsv.exe 2688 spoolsv.exe 996 spoolsv.exe 996 spoolsv.exe 2936 spoolsv.exe 2936 spoolsv.exe 2516 spoolsv.exe 2516 spoolsv.exe 1516 spoolsv.exe 1516 spoolsv.exe 924 explorer.exe 924 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3140 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 84 PID 2248 wrote to memory of 3140 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 84 PID 2248 wrote to memory of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 2248 wrote to memory of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 2248 wrote to memory of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 2248 wrote to memory of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 2248 wrote to memory of 2452 2248 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 95 PID 2452 wrote to memory of 3460 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 96 PID 2452 wrote to memory of 3460 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 96 PID 2452 wrote to memory of 3460 2452 cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe 96 PID 3460 wrote to memory of 3368 3460 explorer.exe 99 PID 3460 wrote to memory of 3368 3460 explorer.exe 99 PID 3460 wrote to memory of 3368 3460 explorer.exe 99 PID 3460 wrote to memory of 3368 3460 explorer.exe 99 PID 3460 wrote to memory of 3368 3460 explorer.exe 99 PID 3368 wrote to memory of 2988 3368 explorer.exe 100 PID 3368 wrote to memory of 2988 3368 explorer.exe 100 PID 3368 wrote to memory of 2988 3368 explorer.exe 100 PID 3368 wrote to memory of 1688 3368 explorer.exe 101 PID 3368 wrote to memory of 1688 3368 explorer.exe 101 PID 3368 wrote to memory of 1688 3368 explorer.exe 101 PID 3368 wrote to memory of 4068 3368 explorer.exe 102 PID 3368 wrote to memory of 4068 3368 explorer.exe 102 PID 3368 wrote to memory of 4068 3368 explorer.exe 102 PID 3368 wrote to memory of 1976 3368 explorer.exe 103 PID 3368 wrote to memory of 1976 3368 explorer.exe 103 PID 3368 wrote to memory of 1976 3368 explorer.exe 103 PID 3368 wrote to memory of 2104 3368 explorer.exe 104 PID 3368 wrote to memory of 2104 3368 explorer.exe 104 PID 3368 wrote to memory of 2104 3368 explorer.exe 104 PID 3368 wrote to memory of 3692 3368 explorer.exe 105 PID 3368 wrote to memory of 3692 3368 explorer.exe 105 PID 3368 wrote to memory of 3692 3368 explorer.exe 105 PID 3368 wrote to memory of 3428 3368 explorer.exe 106 PID 3368 wrote to memory of 3428 3368 explorer.exe 106 PID 3368 wrote to memory of 3428 3368 explorer.exe 106 PID 3368 wrote to memory of 3164 3368 explorer.exe 107 PID 3368 wrote to memory of 3164 3368 explorer.exe 107 PID 3368 wrote to memory of 3164 3368 explorer.exe 107 PID 3368 wrote to memory of 648 3368 explorer.exe 108 PID 3368 wrote to memory of 648 3368 explorer.exe 108 PID 3368 wrote to memory of 648 3368 explorer.exe 108 PID 3368 wrote to memory of 2872 3368 explorer.exe 109 PID 3368 wrote to memory of 2872 3368 explorer.exe 109 PID 3368 wrote to memory of 2872 3368 explorer.exe 109 PID 3368 wrote to memory of 1872 3368 explorer.exe 110 PID 3368 wrote to memory of 1872 3368 explorer.exe 110 PID 3368 wrote to memory of 1872 3368 explorer.exe 110 PID 3368 wrote to memory of 4944 3368 explorer.exe 111 PID 3368 wrote to memory of 4944 3368 explorer.exe 111 PID 3368 wrote to memory of 4944 3368 explorer.exe 111 PID 3368 wrote to memory of 3772 3368 explorer.exe 112 PID 3368 wrote to memory of 3772 3368 explorer.exe 112 PID 3368 wrote to memory of 3772 3368 explorer.exe 112 PID 3368 wrote to memory of 2268 3368 explorer.exe 113 PID 3368 wrote to memory of 2268 3368 explorer.exe 113 PID 3368 wrote to memory of 2268 3368 explorer.exe 113 PID 3368 wrote to memory of 4352 3368 explorer.exe 114 PID 3368 wrote to memory of 4352 3368 explorer.exe 114 PID 3368 wrote to memory of 4352 3368 explorer.exe 114 PID 3368 wrote to memory of 2436 3368 explorer.exe 115 PID 3368 wrote to memory of 2436 3368 explorer.exe 115 PID 3368 wrote to memory of 2436 3368 explorer.exe 115 PID 3368 wrote to memory of 1612 3368 explorer.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfba86a267a860d6ced7722d49bb7e64_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3040 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1232 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- Suspicious use of SetWindowsHookEx
PID:924
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4828 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4576
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3692 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3428 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4472 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3548 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4364
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:648 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1872 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4392 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4808 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1408
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4944 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3772 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1228 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3344 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:860
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2436 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4532 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3436 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2384
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4480 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2736
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4260
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4416 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1056 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:980
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4788 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1476 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:996 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:872 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2492
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1516 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3152 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5200
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3448
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:384
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1488
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4812
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:964
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5528
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2992
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1176
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2300
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2292
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3848 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1100
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4372
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2360
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2312
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5052 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1564
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2896
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:636
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5032
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4968 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1556
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4332 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2680 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5724
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5784
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3824 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5840
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2976
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4268
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5156
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1052
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5480
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3044
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5588
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2084
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3920
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4456
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3120
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1156
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4844
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2984
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1616
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3820
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3416
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5160
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2028
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD53916be0f7e90b2b32d56963297b5fb6c
SHA1cc6656d37c1123f40e3476bea9feca483538b0f6
SHA2562b3817931207edef52d9f0555012753abf0860efb5c4adb440f69a9e05fa4e56
SHA5122754d10cc78a87118adc41a705fb881e99bfb9b2897c9689a731b64bfd2c7ffb27fc5fc1e60efa6606dd6329eed0e6119a920a3a4c425cc3b7a8e5e0196f6d75
-
Filesize
2.2MB
MD5d45bdb670c194e07e5b5fc4ce6647662
SHA1f1e8475a035102db1e9faa194f8be561351f1abb
SHA256d4f8000b8bf7e342c6638bdd5b49838970590d7c178051879a1dfa57dc31fba3
SHA5122394d702993bef8ab2a1abc659f79ca0b5658642422aa73416d6d80118d6ab2d6b78d2e2c7a68f0728d13aed0991a556c972c52acaaf0d33d1763b54b038a212