Analysis
-
max time kernel
102s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 20:48
Behavioral task
behavioral1
Sample
e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
e354471a42c1a308b3efb7764c94c188
-
SHA1
0af243fdd5f4bb097056c86ed3e1e2f539395000
-
SHA256
6cbdd75d1d1e73f09192d0718efc41102f459c9929e75fdee9fc160ab5014cc4
-
SHA512
07ab833f613b5b5c888ac29f4eaf247d9eb33ce09e9e49e7750256aadd47181dc95f95ff8df1cd4df1a32bfabfc3d3402a1db84ce0b74cc824cc8ed886f5460a
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZc:0UzeyQMS4DqodCnoe+iitjWwwY
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe -
Executes dropped EXE 55 IoCs
pid Process 4528 explorer.exe 5068 explorer.exe 804 spoolsv.exe 3572 spoolsv.exe 1372 spoolsv.exe 4528 spoolsv.exe 3464 spoolsv.exe 3460 spoolsv.exe 3508 spoolsv.exe 1308 spoolsv.exe 4372 spoolsv.exe 4804 spoolsv.exe 852 spoolsv.exe 2356 spoolsv.exe 232 spoolsv.exe 1552 spoolsv.exe 2552 spoolsv.exe 3836 spoolsv.exe 4796 spoolsv.exe 3940 spoolsv.exe 3160 spoolsv.exe 4352 spoolsv.exe 3404 spoolsv.exe 948 spoolsv.exe 2484 spoolsv.exe 2224 spoolsv.exe 2588 spoolsv.exe 4908 explorer.exe 864 spoolsv.exe 5064 spoolsv.exe 4280 spoolsv.exe 2896 explorer.exe 5072 spoolsv.exe 5228 spoolsv.exe 5276 explorer.exe 5364 spoolsv.exe 5672 spoolsv.exe 5828 spoolsv.exe 5868 explorer.exe 6096 spoolsv.exe 5172 spoolsv.exe 5212 explorer.exe 1228 spoolsv.exe 2816 spoolsv.exe 5844 explorer.exe 708 spoolsv.exe 1952 spoolsv.exe 5632 spoolsv.exe 5240 spoolsv.exe 5808 explorer.exe 6132 spoolsv.exe 3880 spoolsv.exe 2544 explorer.exe 5596 spoolsv.exe 5684 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 2464 set thread context of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 4528 set thread context of 5068 4528 explorer.exe 105 PID 804 set thread context of 2588 804 spoolsv.exe 130 PID 3572 set thread context of 864 3572 spoolsv.exe 132 PID 1372 set thread context of 4280 1372 spoolsv.exe 134 PID 4528 set thread context of 5228 4528 spoolsv.exe 137 PID 3464 set thread context of 5364 3464 spoolsv.exe 139 PID 3460 set thread context of 5828 3460 spoolsv.exe 141 PID 3508 set thread context of 5172 3508 spoolsv.exe 144 PID 1308 set thread context of 2816 1308 spoolsv.exe 147 PID 4372 set thread context of 1952 4372 spoolsv.exe 150 PID 4804 set thread context of 5240 4804 spoolsv.exe 152 PID 852 set thread context of 3880 852 spoolsv.exe 155 PID 2356 set thread context of 5684 2356 spoolsv.exe 158 -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 5068 explorer.exe 2588 spoolsv.exe 2588 spoolsv.exe 864 spoolsv.exe 864 spoolsv.exe 4280 spoolsv.exe 4280 spoolsv.exe 5228 spoolsv.exe 5228 spoolsv.exe 5364 spoolsv.exe 5364 spoolsv.exe 5828 spoolsv.exe 5828 spoolsv.exe 5172 spoolsv.exe 5172 spoolsv.exe 2816 spoolsv.exe 2816 spoolsv.exe 1952 spoolsv.exe 1952 spoolsv.exe 5240 spoolsv.exe 5240 spoolsv.exe 3880 spoolsv.exe 3880 spoolsv.exe 5684 spoolsv.exe 5684 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 1744 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 91 PID 2464 wrote to memory of 1744 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 91 PID 2464 wrote to memory of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 2464 wrote to memory of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 2464 wrote to memory of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 2464 wrote to memory of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 2464 wrote to memory of 2432 2464 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 101 PID 2432 wrote to memory of 4528 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 102 PID 2432 wrote to memory of 4528 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 102 PID 2432 wrote to memory of 4528 2432 e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe 102 PID 4528 wrote to memory of 5068 4528 explorer.exe 105 PID 4528 wrote to memory of 5068 4528 explorer.exe 105 PID 4528 wrote to memory of 5068 4528 explorer.exe 105 PID 4528 wrote to memory of 5068 4528 explorer.exe 105 PID 4528 wrote to memory of 5068 4528 explorer.exe 105 PID 5068 wrote to memory of 804 5068 explorer.exe 106 PID 5068 wrote to memory of 804 5068 explorer.exe 106 PID 5068 wrote to memory of 804 5068 explorer.exe 106 PID 5068 wrote to memory of 3572 5068 explorer.exe 107 PID 5068 wrote to memory of 3572 5068 explorer.exe 107 PID 5068 wrote to memory of 3572 5068 explorer.exe 107 PID 5068 wrote to memory of 1372 5068 explorer.exe 108 PID 5068 wrote to memory of 1372 5068 explorer.exe 108 PID 5068 wrote to memory of 1372 5068 explorer.exe 108 PID 5068 wrote to memory of 4528 5068 explorer.exe 109 PID 5068 wrote to memory of 4528 5068 explorer.exe 109 PID 5068 wrote to memory of 4528 5068 explorer.exe 109 PID 5068 wrote to memory of 3464 5068 explorer.exe 110 PID 5068 wrote to memory of 3464 5068 explorer.exe 110 PID 5068 wrote to memory of 3464 5068 explorer.exe 110 PID 5068 wrote to memory of 3460 5068 explorer.exe 111 PID 5068 wrote to memory of 3460 5068 explorer.exe 111 PID 5068 wrote to memory of 3460 5068 explorer.exe 111 PID 5068 wrote to memory of 3508 5068 explorer.exe 112 PID 5068 wrote to memory of 3508 5068 explorer.exe 112 PID 5068 wrote to memory of 3508 5068 explorer.exe 112 PID 5068 wrote to memory of 1308 5068 explorer.exe 113 PID 5068 wrote to memory of 1308 5068 explorer.exe 113 PID 5068 wrote to memory of 1308 5068 explorer.exe 113 PID 5068 wrote to memory of 4372 5068 explorer.exe 114 PID 5068 wrote to memory of 4372 5068 explorer.exe 114 PID 5068 wrote to memory of 4372 5068 explorer.exe 114 PID 5068 wrote to memory of 4804 5068 explorer.exe 115 PID 5068 wrote to memory of 4804 5068 explorer.exe 115 PID 5068 wrote to memory of 4804 5068 explorer.exe 115 PID 5068 wrote to memory of 852 5068 explorer.exe 116 PID 5068 wrote to memory of 852 5068 explorer.exe 116 PID 5068 wrote to memory of 852 5068 explorer.exe 116 PID 5068 wrote to memory of 2356 5068 explorer.exe 117 PID 5068 wrote to memory of 2356 5068 explorer.exe 117 PID 5068 wrote to memory of 2356 5068 explorer.exe 117 PID 5068 wrote to memory of 232 5068 explorer.exe 118 PID 5068 wrote to memory of 232 5068 explorer.exe 118 PID 5068 wrote to memory of 232 5068 explorer.exe 118 PID 5068 wrote to memory of 1552 5068 explorer.exe 119 PID 5068 wrote to memory of 1552 5068 explorer.exe 119 PID 5068 wrote to memory of 1552 5068 explorer.exe 119 PID 5068 wrote to memory of 2552 5068 explorer.exe 120 PID 5068 wrote to memory of 2552 5068 explorer.exe 120 PID 5068 wrote to memory of 2552 5068 explorer.exe 120 PID 5068 wrote to memory of 3836 5068 explorer.exe 121 PID 5068 wrote to memory of 3836 5068 explorer.exe 121 PID 5068 wrote to memory of 3836 5068 explorer.exe 121 PID 5068 wrote to memory of 4796 5068 explorer.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e354471a42c1a308b3efb7764c94c188_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4908 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1388
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4280 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5936
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5228 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5276 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:632
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3464 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5828 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5868 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4576
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5172 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5212 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5164
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5844 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5168
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5240 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5808 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4604
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:852 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3880 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2952
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:232 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5184
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1592
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:180
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5268
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6088
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3796
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:512
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3264
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4928
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4796 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5476
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4356
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4424
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5968
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4600
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:6048
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3952
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5732
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5128
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:5848
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1492
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2832
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2836
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3124
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3448
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5064 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5688
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5952
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4004
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1316
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1460
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1932
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6096 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1228 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:708 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2044
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5916
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5136
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5708
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5380
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2880
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:6032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5832
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5116
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1824
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5256
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5648
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5980
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:440
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:436
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5852
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5704
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:5484
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5232
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1032
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4520
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2636
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5056
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4516
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2240
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1216
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5400
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5908
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1604
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6120
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2132
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3060
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4872
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5824
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5496
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:6140
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3140
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3908,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:81⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5efbda7b5a876d021faa58e30d7f528a1
SHA1b73b9e9e94a0e51d8b1be32cbc18bb2c8fec82e3
SHA25664db7abbf57692275d29446f23a7725e5f059c6c3870c9b45b2a492cf3830d02
SHA51231b5f9dc1b741c6d98ab5874e6849aaac35437ba120e5d7de2ed0ca810912607597b373c49cdc90262e4848bc501b4462830995feec08c3192fe68ffce2be8e6
-
Filesize
2.2MB
MD5d233e33f9d8ac1050553f7a628125f36
SHA1dcbe5632135014d7e3023fe0544eff1184ece5c0
SHA256fc33355158e2b21db1eca0eaf235a7e52209bad908c256de79f5667243109793
SHA5123423ef5ae933600118e695951debfd0cc43d61fa3741838f33a0384895f705a11d75ce2c9439f1d8668738d83916a0a251adab824bcd43bfd3558ed402dcec6a