Analysis
-
max time kernel
145s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 05:54
Behavioral task
behavioral1
Sample
e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
e1d518ca8f040020fcb69d6d7980fce6
-
SHA1
845d95d55f29f4a8a9b9010b79f9f0e2a288e6ef
-
SHA256
433c0c999360f72f1519151c974bc5fcb397e2d29cc129cf03e6fedb63a55624
-
SHA512
046014599e08b8db35da41f0505921468921f15553d9fa4939f1a9d95dfe141b7ed496c9639551673cba17fef420dd94e1236392b6305dd4f151f8b705f2ec73
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ3:0UzeyQMS4DqodCnoe+iitjWwwz
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2672 explorer.exe 3048 explorer.exe 1480 spoolsv.exe 2708 spoolsv.exe 2084 spoolsv.exe 768 spoolsv.exe 520 spoolsv.exe 2564 spoolsv.exe 2876 spoolsv.exe 2768 spoolsv.exe 2196 spoolsv.exe 2160 spoolsv.exe 540 spoolsv.exe 1500 spoolsv.exe 2568 spoolsv.exe 2296 spoolsv.exe 1128 spoolsv.exe 2164 spoolsv.exe 2628 spoolsv.exe 1916 spoolsv.exe 1336 spoolsv.exe 2056 spoolsv.exe 2752 spoolsv.exe 2700 spoolsv.exe 300 spoolsv.exe 1388 spoolsv.exe 2572 spoolsv.exe 2100 spoolsv.exe 2836 spoolsv.exe 2624 spoolsv.exe 2656 spoolsv.exe 2544 spoolsv.exe 2644 spoolsv.exe 2908 spoolsv.exe 2792 spoolsv.exe 2032 spoolsv.exe 904 spoolsv.exe 2036 spoolsv.exe 940 spoolsv.exe 2512 spoolsv.exe 2640 spoolsv.exe 1356 spoolsv.exe 2976 spoolsv.exe 2548 spoolsv.exe 924 spoolsv.exe 1784 spoolsv.exe 2108 spoolsv.exe 1860 spoolsv.exe 1856 spoolsv.exe 2796 spoolsv.exe 2608 spoolsv.exe 2136 spoolsv.exe 2524 spoolsv.exe 2748 spoolsv.exe 1688 spoolsv.exe 2256 spoolsv.exe 2944 spoolsv.exe 1544 spoolsv.exe 2244 spoolsv.exe 1220 spoolsv.exe 1836 explorer.exe 1740 spoolsv.exe 2832 spoolsv.exe 2756 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 59 IoCs
description pid Process procid_target PID 2752 set thread context of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2672 set thread context of 3048 2672 explorer.exe 33 PID 1480 set thread context of 1220 1480 spoolsv.exe 91 PID 2708 set thread context of 1740 2708 spoolsv.exe 93 PID 2084 set thread context of 2832 2084 spoolsv.exe 94 PID 768 set thread context of 2756 768 spoolsv.exe 95 PID 520 set thread context of 2684 520 spoolsv.exe 97 PID 2564 set thread context of 3080 2564 spoolsv.exe 98 PID 2876 set thread context of 3620 2876 spoolsv.exe 100 PID 2768 set thread context of 3824 2768 spoolsv.exe 102 PID 2160 set thread context of 4036 2160 spoolsv.exe 103 PID 2196 set thread context of 2576 2196 spoolsv.exe 105 PID 1500 set thread context of 1748 1500 spoolsv.exe 106 PID 540 set thread context of 1752 540 spoolsv.exe 107 PID 2296 set thread context of 3684 2296 spoolsv.exe 109 PID 2568 set thread context of 3584 2568 spoolsv.exe 110 PID 2164 set thread context of 3884 2164 spoolsv.exe 111 PID 1916 set thread context of 1864 1916 spoolsv.exe 113 PID 1128 set thread context of 2480 1128 spoolsv.exe 114 PID 2056 set thread context of 692 2056 spoolsv.exe 115 PID 2700 set thread context of 2596 2700 spoolsv.exe 116 PID 2628 set thread context of 2132 2628 spoolsv.exe 117 PID 1336 set thread context of 1124 1336 spoolsv.exe 118 PID 1388 set thread context of 3424 1388 spoolsv.exe 119 PID 300 set thread context of 3412 300 spoolsv.exe 120 PID 2100 set thread context of 3744 2100 spoolsv.exe 121 PID 2752 set thread context of 3068 2752 spoolsv.exe 122 PID 2544 set thread context of 2924 2544 spoolsv.exe 123 PID 2908 set thread context of 3908 2908 spoolsv.exe 124 PID 2624 set thread context of 2040 2624 spoolsv.exe 125 PID 2032 set thread context of 2112 2032 spoolsv.exe 126 PID 2836 set thread context of 1084 2836 spoolsv.exe 129 PID 2572 set thread context of 1516 2572 spoolsv.exe 130 PID 2036 set thread context of 3184 2036 spoolsv.exe 131 PID 2512 set thread context of 3160 2512 spoolsv.exe 133 PID 1356 set thread context of 3408 1356 spoolsv.exe 132 PID 2656 set thread context of 3296 2656 spoolsv.exe 134 PID 2244 set thread context of 3600 2244 spoolsv.exe 135 PID 1784 set thread context of 2420 1784 spoolsv.exe 137 PID 2644 set thread context of 2704 2644 spoolsv.exe 136 PID 1860 set thread context of 1808 1860 spoolsv.exe 139 PID 2548 set thread context of 3404 2548 spoolsv.exe 138 PID 2136 set thread context of 3968 2136 spoolsv.exe 141 PID 1544 set thread context of 4052 1544 spoolsv.exe 145 PID 2796 set thread context of 3812 2796 spoolsv.exe 140 PID 2748 set thread context of 2200 2748 spoolsv.exe 142 PID 2792 set thread context of 3956 2792 spoolsv.exe 143 PID 2256 set thread context of 4040 2256 spoolsv.exe 144 PID 1856 set thread context of 1060 1856 spoolsv.exe 147 PID 904 set thread context of 1484 904 spoolsv.exe 146 PID 1688 set thread context of 3560 1688 spoolsv.exe 149 PID 940 set thread context of 3104 940 spoolsv.exe 148 PID 2108 set thread context of 3380 2108 spoolsv.exe 151 PID 2640 set thread context of 3572 2640 spoolsv.exe 150 PID 2976 set thread context of 3168 2976 spoolsv.exe 152 PID 2608 set thread context of 3208 2608 spoolsv.exe 153 PID 924 set thread context of 2240 924 spoolsv.exe 154 PID 2524 set thread context of 3136 2524 spoolsv.exe 155 PID 2944 set thread context of 2460 2944 spoolsv.exe 156 -
Drops file in Windows directory 63 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 1220 spoolsv.exe 1220 spoolsv.exe 1740 spoolsv.exe 1740 spoolsv.exe 2832 spoolsv.exe 2832 spoolsv.exe 2756 spoolsv.exe 2756 spoolsv.exe 2684 spoolsv.exe 2684 spoolsv.exe 3080 spoolsv.exe 3080 spoolsv.exe 3620 spoolsv.exe 3620 spoolsv.exe 3824 spoolsv.exe 3824 spoolsv.exe 4036 spoolsv.exe 4036 spoolsv.exe 2576 spoolsv.exe 2576 spoolsv.exe 1748 spoolsv.exe 1748 spoolsv.exe 1752 spoolsv.exe 1752 spoolsv.exe 3684 spoolsv.exe 3684 spoolsv.exe 3584 spoolsv.exe 3584 spoolsv.exe 3884 spoolsv.exe 3884 spoolsv.exe 1864 spoolsv.exe 1864 spoolsv.exe 2480 spoolsv.exe 2480 spoolsv.exe 692 spoolsv.exe 692 spoolsv.exe 2596 spoolsv.exe 2596 spoolsv.exe 2132 spoolsv.exe 2132 spoolsv.exe 1124 spoolsv.exe 1124 spoolsv.exe 3424 spoolsv.exe 3424 spoolsv.exe 3412 spoolsv.exe 3412 spoolsv.exe 3744 spoolsv.exe 3744 spoolsv.exe 3068 spoolsv.exe 3068 spoolsv.exe 2924 spoolsv.exe 2924 spoolsv.exe 3908 spoolsv.exe 3908 spoolsv.exe 2040 spoolsv.exe 2040 spoolsv.exe 2112 spoolsv.exe 2112 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2168 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2168 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2168 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2168 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2696 2752 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2672 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2672 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2672 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2672 2696 e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe 32 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 2672 wrote to memory of 3048 2672 explorer.exe 33 PID 3048 wrote to memory of 1480 3048 explorer.exe 34 PID 3048 wrote to memory of 1480 3048 explorer.exe 34 PID 3048 wrote to memory of 1480 3048 explorer.exe 34 PID 3048 wrote to memory of 1480 3048 explorer.exe 34 PID 3048 wrote to memory of 2708 3048 explorer.exe 35 PID 3048 wrote to memory of 2708 3048 explorer.exe 35 PID 3048 wrote to memory of 2708 3048 explorer.exe 35 PID 3048 wrote to memory of 2708 3048 explorer.exe 35 PID 3048 wrote to memory of 2084 3048 explorer.exe 36 PID 3048 wrote to memory of 2084 3048 explorer.exe 36 PID 3048 wrote to memory of 2084 3048 explorer.exe 36 PID 3048 wrote to memory of 2084 3048 explorer.exe 36 PID 3048 wrote to memory of 768 3048 explorer.exe 37 PID 3048 wrote to memory of 768 3048 explorer.exe 37 PID 3048 wrote to memory of 768 3048 explorer.exe 37 PID 3048 wrote to memory of 768 3048 explorer.exe 37 PID 3048 wrote to memory of 520 3048 explorer.exe 38 PID 3048 wrote to memory of 520 3048 explorer.exe 38 PID 3048 wrote to memory of 520 3048 explorer.exe 38 PID 3048 wrote to memory of 520 3048 explorer.exe 38 PID 3048 wrote to memory of 2564 3048 explorer.exe 39 PID 3048 wrote to memory of 2564 3048 explorer.exe 39 PID 3048 wrote to memory of 2564 3048 explorer.exe 39 PID 3048 wrote to memory of 2564 3048 explorer.exe 39 PID 3048 wrote to memory of 2876 3048 explorer.exe 40 PID 3048 wrote to memory of 2876 3048 explorer.exe 40 PID 3048 wrote to memory of 2876 3048 explorer.exe 40 PID 3048 wrote to memory of 2876 3048 explorer.exe 40 PID 3048 wrote to memory of 2768 3048 explorer.exe 41 PID 3048 wrote to memory of 2768 3048 explorer.exe 41 PID 3048 wrote to memory of 2768 3048 explorer.exe 41 PID 3048 wrote to memory of 2768 3048 explorer.exe 41 PID 3048 wrote to memory of 2196 3048 explorer.exe 42 PID 3048 wrote to memory of 2196 3048 explorer.exe 42 PID 3048 wrote to memory of 2196 3048 explorer.exe 42 PID 3048 wrote to memory of 2196 3048 explorer.exe 42 PID 3048 wrote to memory of 2160 3048 explorer.exe 43 PID 3048 wrote to memory of 2160 3048 explorer.exe 43 PID 3048 wrote to memory of 2160 3048 explorer.exe 43 PID 3048 wrote to memory of 2160 3048 explorer.exe 43 PID 3048 wrote to memory of 540 3048 explorer.exe 44 PID 3048 wrote to memory of 540 3048 explorer.exe 44 PID 3048 wrote to memory of 540 3048 explorer.exe 44 PID 3048 wrote to memory of 540 3048 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1d518ca8f040020fcb69d6d7980fce6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1220 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2708 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:520 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2564 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2876 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3620 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2768 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2196 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4036
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1752 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1500 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2568 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2296 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1128 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2164 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1916 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1336 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:300 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1388 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3744
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2040 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3296
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2792 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:904 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2036 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2640 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2976 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:924 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1784 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2420
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1808
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2796 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2608 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2136 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3136
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2748 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2256 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2944 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4052
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2244 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:916
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2192
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:3944
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1072
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2816
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5b99758b800bbea70a270223c1fb83b1d
SHA1d2243babeaed92cf3c9a4ebaa88a1c51695882f0
SHA2564376353b1ee7a70a6aa01952dab20a5bbc68143e98508aadf1255c627027f2bd
SHA5127303f9c25568474afc07d9da5282e9525875a608e33ccb3070a10ccf4f4cec0655f7538cc0876b18d80727810c203245b2e00fd3e1b8369b309643d16d8090ba
-
Filesize
2.2MB
MD5b01a78781948e8c55c1669a0d5130907
SHA1b2828a6021a594fecda20564b37361ec488b41c4
SHA256cc70d55a34241f693ff40a3a54cde7071a82874d82d0e0262fbdfdeeb3a99b29
SHA51246339483aa3eb9ba0c9a437487d2c74f38701b8e357ee24c1d3578df67a3de72e3912e9b427da151d18d4c20e5cefae1a4ddff9d87bfb2472a1e2223b89d38fa