Analysis
-
max time kernel
145s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:39
Behavioral task
behavioral1
Sample
d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
d4e6fb165bcffae035c76f044772e507
-
SHA1
7e67d0d8e85e9291242118e9331f08e714a08ea1
-
SHA256
5dea14ad224cb50721fbe0a644a6f787c9e3c0b22aae6d0c8fa905d814ab7adf
-
SHA512
7c3c66a307cc076d208f8e269913d26982e992ccda84d347ffdffcb997904db6d7c68ef6e1fb3293288d64f3c375e132e3f652756c695a514a99ad588d407730
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZf:0UzeyQMS4DqodCnoe+iitjWwwb
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2696 explorer.exe 1160 explorer.exe 2880 spoolsv.exe 1648 spoolsv.exe 2160 spoolsv.exe 1904 spoolsv.exe 2244 spoolsv.exe 2844 spoolsv.exe 1708 spoolsv.exe 2008 spoolsv.exe 2172 spoolsv.exe 2412 spoolsv.exe 2536 spoolsv.exe 2960 spoolsv.exe 1600 spoolsv.exe 2128 spoolsv.exe 2056 spoolsv.exe 3004 spoolsv.exe 2340 spoolsv.exe 2492 spoolsv.exe 2196 spoolsv.exe 3028 spoolsv.exe 1896 spoolsv.exe 944 spoolsv.exe 3036 spoolsv.exe 2016 spoolsv.exe 3064 spoolsv.exe 396 spoolsv.exe 2660 spoolsv.exe 2896 spoolsv.exe 2336 spoolsv.exe 2484 spoolsv.exe 1132 spoolsv.exe 1632 spoolsv.exe 2524 spoolsv.exe 2812 spoolsv.exe 1960 spoolsv.exe 1564 spoolsv.exe 2684 spoolsv.exe 1196 spoolsv.exe 2212 spoolsv.exe 1820 spoolsv.exe 2656 spoolsv.exe 1560 spoolsv.exe 2288 spoolsv.exe 3032 spoolsv.exe 2548 spoolsv.exe 2228 spoolsv.exe 1996 spoolsv.exe 2736 spoolsv.exe 2956 spoolsv.exe 1524 spoolsv.exe 2780 spoolsv.exe 2964 spoolsv.exe 2432 spoolsv.exe 2552 spoolsv.exe 2860 spoolsv.exe 820 spoolsv.exe 2296 explorer.exe 2176 spoolsv.exe 2904 spoolsv.exe 1268 spoolsv.exe 1624 spoolsv.exe 2192 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 55 IoCs
description pid Process procid_target PID 1424 set thread context of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 2696 set thread context of 1160 2696 explorer.exe 32 PID 2880 set thread context of 2860 2880 spoolsv.exe 87 PID 1648 set thread context of 820 1648 spoolsv.exe 88 PID 1904 set thread context of 2176 1904 spoolsv.exe 90 PID 2160 set thread context of 2904 2160 spoolsv.exe 91 PID 2844 set thread context of 1624 2844 spoolsv.exe 93 PID 2244 set thread context of 2192 2244 spoolsv.exe 94 PID 2008 set thread context of 3080 2008 spoolsv.exe 95 PID 1708 set thread context of 3332 1708 spoolsv.exe 98 PID 2412 set thread context of 3520 2412 spoolsv.exe 99 PID 2172 set thread context of 3676 2172 spoolsv.exe 100 PID 2960 set thread context of 3684 2960 spoolsv.exe 101 PID 2128 set thread context of 3892 2128 spoolsv.exe 103 PID 3004 set thread context of 3968 3004 spoolsv.exe 105 PID 1600 set thread context of 4020 1600 spoolsv.exe 106 PID 2536 set thread context of 4084 2536 spoolsv.exe 107 PID 2492 set thread context of 896 2492 spoolsv.exe 108 PID 3028 set thread context of 3548 3028 spoolsv.exe 109 PID 2056 set thread context of 1284 2056 spoolsv.exe 110 PID 2340 set thread context of 3580 2340 spoolsv.exe 111 PID 2432 set thread context of 3592 2432 spoolsv.exe 112 PID 944 set thread context of 3644 944 spoolsv.exe 113 PID 2016 set thread context of 2948 2016 spoolsv.exe 115 PID 2196 set thread context of 2472 2196 spoolsv.exe 116 PID 396 set thread context of 1944 396 spoolsv.exe 117 PID 2896 set thread context of 4008 2896 spoolsv.exe 118 PID 2484 set thread context of 2572 2484 spoolsv.exe 120 PID 1896 set thread context of 552 1896 spoolsv.exe 119 PID 1632 set thread context of 4088 1632 spoolsv.exe 121 PID 1564 set thread context of 2168 1564 spoolsv.exe 124 PID 3036 set thread context of 3392 3036 spoolsv.exe 123 PID 2812 set thread context of 2052 2812 spoolsv.exe 125 PID 3064 set thread context of 3468 3064 spoolsv.exe 126 PID 1196 set thread context of 3504 1196 spoolsv.exe 127 PID 1820 set thread context of 952 1820 spoolsv.exe 128 PID 2660 set thread context of 3784 2660 spoolsv.exe 130 PID 3032 set thread context of 3776 3032 spoolsv.exe 129 PID 1560 set thread context of 652 1560 spoolsv.exe 132 PID 2228 set thread context of 3824 2228 spoolsv.exe 131 PID 2736 set thread context of 3904 2736 spoolsv.exe 134 PID 2964 set thread context of 3852 2964 spoolsv.exe 133 PID 1960 set thread context of 972 1960 spoolsv.exe 136 PID 1524 set thread context of 2868 1524 spoolsv.exe 135 PID 1996 set thread context of 1992 1996 spoolsv.exe 138 PID 2336 set thread context of 4068 2336 spoolsv.exe 137 PID 2212 set thread context of 2416 2212 spoolsv.exe 140 PID 1132 set thread context of 2344 1132 spoolsv.exe 139 PID 2548 set thread context of 3228 2548 spoolsv.exe 142 PID 2684 set thread context of 2284 2684 spoolsv.exe 144 PID 2524 set thread context of 844 2524 spoolsv.exe 143 PID 2956 set thread context of 1828 2956 spoolsv.exe 146 PID 2656 set thread context of 2808 2656 spoolsv.exe 145 PID 2288 set thread context of 3296 2288 spoolsv.exe 147 PID 2780 set thread context of 3272 2780 spoolsv.exe 148 -
Drops file in Windows directory 59 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1160 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 1160 explorer.exe 2860 spoolsv.exe 2860 spoolsv.exe 820 spoolsv.exe 820 spoolsv.exe 2176 spoolsv.exe 2176 spoolsv.exe 2904 spoolsv.exe 2904 spoolsv.exe 1624 spoolsv.exe 1624 spoolsv.exe 2192 spoolsv.exe 2192 spoolsv.exe 3080 spoolsv.exe 3080 spoolsv.exe 3332 spoolsv.exe 3332 spoolsv.exe 3520 spoolsv.exe 3520 spoolsv.exe 3676 spoolsv.exe 3676 spoolsv.exe 3684 spoolsv.exe 3684 spoolsv.exe 3892 spoolsv.exe 3892 spoolsv.exe 3968 spoolsv.exe 3968 spoolsv.exe 4020 spoolsv.exe 4020 spoolsv.exe 4084 spoolsv.exe 4084 spoolsv.exe 896 spoolsv.exe 896 spoolsv.exe 3548 spoolsv.exe 3548 spoolsv.exe 1284 spoolsv.exe 1284 spoolsv.exe 3580 spoolsv.exe 3580 spoolsv.exe 3592 spoolsv.exe 3592 spoolsv.exe 3644 spoolsv.exe 3644 spoolsv.exe 2948 spoolsv.exe 2948 spoolsv.exe 2472 spoolsv.exe 2472 spoolsv.exe 1944 spoolsv.exe 4008 spoolsv.exe 1944 spoolsv.exe 4008 spoolsv.exe 2572 spoolsv.exe 2572 spoolsv.exe 552 spoolsv.exe 552 spoolsv.exe 4088 spoolsv.exe 4088 spoolsv.exe 2168 spoolsv.exe 2168 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2468 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2468 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2468 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2468 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 1424 wrote to memory of 2768 1424 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2696 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2696 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2696 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2696 2768 d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe 31 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 2696 wrote to memory of 1160 2696 explorer.exe 32 PID 1160 wrote to memory of 2880 1160 explorer.exe 33 PID 1160 wrote to memory of 2880 1160 explorer.exe 33 PID 1160 wrote to memory of 2880 1160 explorer.exe 33 PID 1160 wrote to memory of 2880 1160 explorer.exe 33 PID 1160 wrote to memory of 1648 1160 explorer.exe 34 PID 1160 wrote to memory of 1648 1160 explorer.exe 34 PID 1160 wrote to memory of 1648 1160 explorer.exe 34 PID 1160 wrote to memory of 1648 1160 explorer.exe 34 PID 1160 wrote to memory of 2160 1160 explorer.exe 35 PID 1160 wrote to memory of 2160 1160 explorer.exe 35 PID 1160 wrote to memory of 2160 1160 explorer.exe 35 PID 1160 wrote to memory of 2160 1160 explorer.exe 35 PID 1160 wrote to memory of 1904 1160 explorer.exe 36 PID 1160 wrote to memory of 1904 1160 explorer.exe 36 PID 1160 wrote to memory of 1904 1160 explorer.exe 36 PID 1160 wrote to memory of 1904 1160 explorer.exe 36 PID 1160 wrote to memory of 2244 1160 explorer.exe 37 PID 1160 wrote to memory of 2244 1160 explorer.exe 37 PID 1160 wrote to memory of 2244 1160 explorer.exe 37 PID 1160 wrote to memory of 2244 1160 explorer.exe 37 PID 1160 wrote to memory of 2844 1160 explorer.exe 38 PID 1160 wrote to memory of 2844 1160 explorer.exe 38 PID 1160 wrote to memory of 2844 1160 explorer.exe 38 PID 1160 wrote to memory of 2844 1160 explorer.exe 38 PID 1160 wrote to memory of 1708 1160 explorer.exe 39 PID 1160 wrote to memory of 1708 1160 explorer.exe 39 PID 1160 wrote to memory of 1708 1160 explorer.exe 39 PID 1160 wrote to memory of 1708 1160 explorer.exe 39 PID 1160 wrote to memory of 2008 1160 explorer.exe 40 PID 1160 wrote to memory of 2008 1160 explorer.exe 40 PID 1160 wrote to memory of 2008 1160 explorer.exe 40 PID 1160 wrote to memory of 2008 1160 explorer.exe 40 PID 1160 wrote to memory of 2172 1160 explorer.exe 41 PID 1160 wrote to memory of 2172 1160 explorer.exe 41 PID 1160 wrote to memory of 2172 1160 explorer.exe 41 PID 1160 wrote to memory of 2172 1160 explorer.exe 41 PID 1160 wrote to memory of 2412 1160 explorer.exe 42 PID 1160 wrote to memory of 2412 1160 explorer.exe 42 PID 1160 wrote to memory of 2412 1160 explorer.exe 42 PID 1160 wrote to memory of 2412 1160 explorer.exe 42 PID 1160 wrote to memory of 2536 1160 explorer.exe 43 PID 1160 wrote to memory of 2536 1160 explorer.exe 43 PID 1160 wrote to memory of 2536 1160 explorer.exe 43 PID 1160 wrote to memory of 2536 1160 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4e6fb165bcffae035c76f044772e507_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1648 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2844 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1708 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3080 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2172 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3520
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3892 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3960
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2340 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3580
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:896
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:944 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3468
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:396 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2812 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2684 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1560 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2736 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2868
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2780 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2964 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:2552
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1268
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3180
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:284
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5ff57ddb0ee8ad74404484ca7469f9a19
SHA196d0476ec58cce3323e0973305ca05667fad1487
SHA25676f44f66cdc0c5fc9ee6e34dfb8952b7fd4e42f8e45a95d445103daaf7495a70
SHA5128f34c9f1fd3c7ebb7c848815d3a329a76f5616e5a998ce37a2cbbd3e75970ec95be606048a5a80eae6a903417ffd359b3ca87c4573d281fa1bae988d72087d30
-
Filesize
2.2MB
MD5e2c32286f1e7095041b8ce4533f8c7eb
SHA132ed88e15e5336b7a455ba12cd8baacc5f1ccee6
SHA25656ca43b3c76debcf7a68f77d10c64731c5707d92fb37de183a0cb874b82d2013
SHA5121501b0e68439c98c2c05bc246fa10b72340e77342f858dcdc21f675446229a0b4fc1042b12f0ef7c45c180c3e78cb86245dbec67ae5f7d034b34258cc22432f0