Analysis
-
max time kernel
148s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 05:09
Behavioral task
behavioral1
Sample
ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
ddbc58fc2d9472db8c506ac1faf7dad3
-
SHA1
9677254d32e5e948b095abdf92d9c359766f8e76
-
SHA256
ddb85e533f2f9cf3d0c3ad2f73b5cdf432cee1aebd4dde181600cf956bea1ba8
-
SHA512
1321263c3ec2ba51c0fbb591190bef7f501dec4db8b9efe8949c9a6e4dbab12974795e5776e3ac3d75bd08645b7448a46bbe2e5d69376573038cf14ae012a827
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZe:0UzeyQMS4DqodCnoe+iitjWwwy
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2532 explorer.exe 4072 explorer.exe 3360 spoolsv.exe 1648 spoolsv.exe 1224 spoolsv.exe 1548 spoolsv.exe 4312 spoolsv.exe 2724 spoolsv.exe 4680 spoolsv.exe 2240 spoolsv.exe 4820 spoolsv.exe 3084 spoolsv.exe 4324 spoolsv.exe 3644 spoolsv.exe 1008 spoolsv.exe 4776 spoolsv.exe 1816 spoolsv.exe 2380 spoolsv.exe 2076 spoolsv.exe 3988 spoolsv.exe 3404 spoolsv.exe 4380 spoolsv.exe 1220 spoolsv.exe 4532 spoolsv.exe 3724 spoolsv.exe 4044 spoolsv.exe 3824 spoolsv.exe 4752 spoolsv.exe 2804 spoolsv.exe 4828 spoolsv.exe 448 spoolsv.exe 3760 spoolsv.exe 960 spoolsv.exe 2776 explorer.exe 2956 spoolsv.exe 4632 spoolsv.exe 4084 spoolsv.exe 3612 spoolsv.exe 3668 spoolsv.exe 2832 spoolsv.exe 2384 explorer.exe 944 spoolsv.exe 4388 spoolsv.exe 412 spoolsv.exe 2984 explorer.exe 4824 spoolsv.exe 4796 spoolsv.exe 3776 spoolsv.exe 2124 spoolsv.exe 2976 spoolsv.exe 2236 spoolsv.exe 1988 explorer.exe 3532 spoolsv.exe 216 spoolsv.exe 4336 spoolsv.exe 3320 spoolsv.exe 4160 spoolsv.exe 3692 spoolsv.exe 2404 spoolsv.exe 924 explorer.exe 64 spoolsv.exe 2004 spoolsv.exe 4472 spoolsv.exe 112 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 56 IoCs
description pid Process procid_target PID 2276 set thread context of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 2532 set thread context of 4072 2532 explorer.exe 99 PID 3360 set thread context of 960 3360 spoolsv.exe 130 PID 1648 set thread context of 4632 1648 spoolsv.exe 133 PID 1224 set thread context of 4084 1224 spoolsv.exe 134 PID 1548 set thread context of 3612 1548 spoolsv.exe 135 PID 4312 set thread context of 2832 4312 spoolsv.exe 137 PID 2724 set thread context of 944 2724 spoolsv.exe 139 PID 4680 set thread context of 412 4680 spoolsv.exe 141 PID 2240 set thread context of 4824 2240 spoolsv.exe 143 PID 4820 set thread context of 4796 4820 spoolsv.exe 144 PID 3084 set thread context of 3776 3084 spoolsv.exe 145 PID 4324 set thread context of 2124 4324 spoolsv.exe 146 PID 3644 set thread context of 2236 3644 spoolsv.exe 148 PID 1008 set thread context of 3532 1008 spoolsv.exe 150 PID 4776 set thread context of 216 4776 spoolsv.exe 151 PID 1816 set thread context of 3320 1816 spoolsv.exe 153 PID 2380 set thread context of 4160 2380 spoolsv.exe 154 PID 2076 set thread context of 3692 2076 spoolsv.exe 155 PID 3988 set thread context of 2404 3988 spoolsv.exe 156 PID 3404 set thread context of 64 3404 spoolsv.exe 158 PID 4380 set thread context of 4472 4380 spoolsv.exe 160 PID 1220 set thread context of 112 1220 spoolsv.exe 161 PID 4532 set thread context of 1360 4532 spoolsv.exe 162 PID 3724 set thread context of 5024 3724 spoolsv.exe 163 PID 4044 set thread context of 4584 4044 spoolsv.exe 164 PID 3824 set thread context of 1396 3824 spoolsv.exe 166 PID 4752 set thread context of 2228 4752 spoolsv.exe 168 PID 2804 set thread context of 1504 2804 spoolsv.exe 169 PID 4828 set thread context of 4812 4828 spoolsv.exe 170 PID 448 set thread context of 5100 448 spoolsv.exe 171 PID 3760 set thread context of 3576 3760 spoolsv.exe 174 PID 2776 set thread context of 3652 2776 explorer.exe 177 PID 2956 set thread context of 4496 2956 spoolsv.exe 178 PID 3668 set thread context of 4276 3668 spoolsv.exe 181 PID 2384 set thread context of 4756 2384 explorer.exe 183 PID 2984 set thread context of 2788 2984 explorer.exe 187 PID 4388 set thread context of 4804 4388 spoolsv.exe 188 PID 2976 set thread context of 4060 2976 spoolsv.exe 192 PID 1988 set thread context of 2428 1988 explorer.exe 197 PID 4336 set thread context of 1332 4336 spoolsv.exe 199 PID 924 set thread context of 4656 924 explorer.exe 203 PID 2004 set thread context of 2584 2004 spoolsv.exe 205 PID 1036 set thread context of 2360 1036 explorer.exe 209 PID 3036 set thread context of 5056 3036 spoolsv.exe 210 PID 1768 set thread context of 4452 1768 spoolsv.exe 213 PID 4536 set thread context of 3596 4536 explorer.exe 214 PID 3904 set thread context of 4684 3904 spoolsv.exe 216 PID 5108 set thread context of 3460 5108 spoolsv.exe 218 PID 2756 set thread context of 2532 2756 explorer.exe 219 PID 624 set thread context of 3228 624 spoolsv.exe 221 PID 3672 set thread context of 748 3672 explorer.exe 223 PID 4580 set thread context of 3968 4580 spoolsv.exe 224 PID 5060 set thread context of 4264 5060 spoolsv.exe 225 PID 4848 set thread context of 2692 4848 spoolsv.exe 227 PID 3748 set thread context of 1716 3748 explorer.exe 229 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4072 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 4072 explorer.exe 960 spoolsv.exe 960 spoolsv.exe 4632 spoolsv.exe 4632 spoolsv.exe 4084 spoolsv.exe 4084 spoolsv.exe 3612 spoolsv.exe 3612 spoolsv.exe 2832 spoolsv.exe 2832 spoolsv.exe 944 spoolsv.exe 944 spoolsv.exe 412 spoolsv.exe 412 spoolsv.exe 4824 spoolsv.exe 4824 spoolsv.exe 4796 spoolsv.exe 4796 spoolsv.exe 3776 spoolsv.exe 3776 spoolsv.exe 2124 spoolsv.exe 2124 spoolsv.exe 2236 spoolsv.exe 2236 spoolsv.exe 3532 spoolsv.exe 3532 spoolsv.exe 216 spoolsv.exe 216 spoolsv.exe 3320 spoolsv.exe 3320 spoolsv.exe 4160 spoolsv.exe 4160 spoolsv.exe 3692 spoolsv.exe 3692 spoolsv.exe 2404 spoolsv.exe 2404 spoolsv.exe 64 spoolsv.exe 64 spoolsv.exe 4472 spoolsv.exe 4472 spoolsv.exe 112 spoolsv.exe 112 spoolsv.exe 1360 spoolsv.exe 1360 spoolsv.exe 5024 spoolsv.exe 5024 spoolsv.exe 4584 spoolsv.exe 4584 spoolsv.exe 1396 spoolsv.exe 1396 spoolsv.exe 2228 spoolsv.exe 2228 spoolsv.exe 1504 spoolsv.exe 1504 spoolsv.exe 4812 spoolsv.exe 4812 spoolsv.exe 5100 spoolsv.exe 5100 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2456 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 83 PID 2276 wrote to memory of 2456 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 83 PID 2276 wrote to memory of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 2276 wrote to memory of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 2276 wrote to memory of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 2276 wrote to memory of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 2276 wrote to memory of 4808 2276 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 95 PID 4808 wrote to memory of 2532 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 96 PID 4808 wrote to memory of 2532 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 96 PID 4808 wrote to memory of 2532 4808 ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe 96 PID 2532 wrote to memory of 4072 2532 explorer.exe 99 PID 2532 wrote to memory of 4072 2532 explorer.exe 99 PID 2532 wrote to memory of 4072 2532 explorer.exe 99 PID 2532 wrote to memory of 4072 2532 explorer.exe 99 PID 2532 wrote to memory of 4072 2532 explorer.exe 99 PID 4072 wrote to memory of 3360 4072 explorer.exe 100 PID 4072 wrote to memory of 3360 4072 explorer.exe 100 PID 4072 wrote to memory of 3360 4072 explorer.exe 100 PID 4072 wrote to memory of 1648 4072 explorer.exe 101 PID 4072 wrote to memory of 1648 4072 explorer.exe 101 PID 4072 wrote to memory of 1648 4072 explorer.exe 101 PID 4072 wrote to memory of 1224 4072 explorer.exe 102 PID 4072 wrote to memory of 1224 4072 explorer.exe 102 PID 4072 wrote to memory of 1224 4072 explorer.exe 102 PID 4072 wrote to memory of 1548 4072 explorer.exe 103 PID 4072 wrote to memory of 1548 4072 explorer.exe 103 PID 4072 wrote to memory of 1548 4072 explorer.exe 103 PID 4072 wrote to memory of 4312 4072 explorer.exe 104 PID 4072 wrote to memory of 4312 4072 explorer.exe 104 PID 4072 wrote to memory of 4312 4072 explorer.exe 104 PID 4072 wrote to memory of 2724 4072 explorer.exe 105 PID 4072 wrote to memory of 2724 4072 explorer.exe 105 PID 4072 wrote to memory of 2724 4072 explorer.exe 105 PID 4072 wrote to memory of 4680 4072 explorer.exe 106 PID 4072 wrote to memory of 4680 4072 explorer.exe 106 PID 4072 wrote to memory of 4680 4072 explorer.exe 106 PID 4072 wrote to memory of 2240 4072 explorer.exe 107 PID 4072 wrote to memory of 2240 4072 explorer.exe 107 PID 4072 wrote to memory of 2240 4072 explorer.exe 107 PID 4072 wrote to memory of 4820 4072 explorer.exe 108 PID 4072 wrote to memory of 4820 4072 explorer.exe 108 PID 4072 wrote to memory of 4820 4072 explorer.exe 108 PID 4072 wrote to memory of 3084 4072 explorer.exe 109 PID 4072 wrote to memory of 3084 4072 explorer.exe 109 PID 4072 wrote to memory of 3084 4072 explorer.exe 109 PID 4072 wrote to memory of 4324 4072 explorer.exe 110 PID 4072 wrote to memory of 4324 4072 explorer.exe 110 PID 4072 wrote to memory of 4324 4072 explorer.exe 110 PID 4072 wrote to memory of 3644 4072 explorer.exe 111 PID 4072 wrote to memory of 3644 4072 explorer.exe 111 PID 4072 wrote to memory of 3644 4072 explorer.exe 111 PID 4072 wrote to memory of 1008 4072 explorer.exe 112 PID 4072 wrote to memory of 1008 4072 explorer.exe 112 PID 4072 wrote to memory of 1008 4072 explorer.exe 112 PID 4072 wrote to memory of 4776 4072 explorer.exe 113 PID 4072 wrote to memory of 4776 4072 explorer.exe 113 PID 4072 wrote to memory of 4776 4072 explorer.exe 113 PID 4072 wrote to memory of 1816 4072 explorer.exe 114 PID 4072 wrote to memory of 1816 4072 explorer.exe 114 PID 4072 wrote to memory of 1816 4072 explorer.exe 114 PID 4072 wrote to memory of 2380 4072 explorer.exe 115 PID 4072 wrote to memory of 2380 4072 explorer.exe 115 PID 4072 wrote to memory of 2380 4072 explorer.exe 115 PID 4072 wrote to memory of 2076 4072 explorer.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddbc58fc2d9472db8c506ac1faf7dad3_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3360 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2776 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3652
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3612
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2384 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2724 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4680 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:412 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2984 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2240 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1988 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2428
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1008 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3532
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4776 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:216
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1816 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:924 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:64
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4380 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4532 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3724 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4044 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4584 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1036 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2360
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3824 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2228
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5100 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4536 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4496
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2756 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2532
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3668 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4276
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3672 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4388 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4804 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:3748 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4060
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1332
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4360
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2584
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5056 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2224
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4684
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3928
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3460
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3228
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4580 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4264
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4848 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2692 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3356
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1336
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3340
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1420
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3740
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2392
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4508
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4088
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4024
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3900
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5ad51c5f17e616f73c4e17bfaad74920c
SHA15480cc8bd72d14c504b8e93d3ef3aac0004b8f4c
SHA25649002789e2f2cef84a6891b516a3f3eae6a1e682bae85f1d86c4845e92b90fe8
SHA512d599e429e814d201e6c131c6764e717b2c8a6ce1d0ea0024f63f7596c448bafa4152827b51ab3d48a07b015acadb312a088efdde32dde2a069f1b081a7c86e51
-
Filesize
2.2MB
MD5e2554171b629639be142bd8dcb24cd2c
SHA1e61bb0e9a5307d06a4b9d4b0b37f74f739024c45
SHA256950296e85451ed2da954f25b443c95c0aa4e3107f852f09bda7f92006efc278a
SHA5125842cd1083700a13ff2dee2ce374f7da36b717111c1a592a9e0b8966a9bdd84161b4ebb2418234fe869a78d687fb6da888d4fd196b4181dd4af17159c7c14a73