Analysis
-
max time kernel
127s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 18:17
Behavioral task
behavioral1
Sample
e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
e558fd0aa8ad3a6357fa3bcc63edbfc5
-
SHA1
c3703a60e28f046aaf77081ae80eba3f5da0a048
-
SHA256
cf789e7af3f54e9145520be39e9adee684312e5af6cacb98335308c48aa6270e
-
SHA512
9a35c507ca852eb4a0ff683b39d092eb0d7f2727163afa3367cea9d48280248d62cc9594d85bc1c7ed69e26a07f0cc04b7db8857eba743b0ee841b1545bdf3a2
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZV:0UzeyQMS4DqodCnoe+iitjWwwp
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4700 explorer.exe 4088 explorer.exe 432 spoolsv.exe 3608 spoolsv.exe 4744 spoolsv.exe 2832 spoolsv.exe 3452 spoolsv.exe 1032 spoolsv.exe 2072 spoolsv.exe 2600 spoolsv.exe 2240 spoolsv.exe 4732 spoolsv.exe 2016 spoolsv.exe 460 spoolsv.exe 2948 spoolsv.exe 5112 spoolsv.exe 4556 spoolsv.exe 620 spoolsv.exe 4108 spoolsv.exe 3700 spoolsv.exe 3308 spoolsv.exe 4340 spoolsv.exe 1176 spoolsv.exe 4540 spoolsv.exe 1944 spoolsv.exe 392 spoolsv.exe 4472 spoolsv.exe 3596 spoolsv.exe 3268 spoolsv.exe 4412 spoolsv.exe 216 spoolsv.exe 4432 explorer.exe 1724 spoolsv.exe 4912 spoolsv.exe 376 spoolsv.exe 4012 spoolsv.exe 3084 spoolsv.exe 4264 spoolsv.exe 864 explorer.exe 2852 spoolsv.exe 1352 spoolsv.exe 3604 spoolsv.exe 1392 spoolsv.exe 2492 spoolsv.exe 3672 explorer.exe 4936 spoolsv.exe 3920 spoolsv.exe 4356 spoolsv.exe 712 spoolsv.exe 1580 explorer.exe 5104 spoolsv.exe 4752 spoolsv.exe 2712 spoolsv.exe 4344 spoolsv.exe 4568 spoolsv.exe 2796 explorer.exe 3852 spoolsv.exe 2168 spoolsv.exe 760 spoolsv.exe 3504 spoolsv.exe 1568 spoolsv.exe 3660 explorer.exe 2044 spoolsv.exe 1660 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 37 IoCs
description pid Process procid_target PID 5080 set thread context of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 4700 set thread context of 4088 4700 explorer.exe 95 PID 432 set thread context of 216 432 spoolsv.exe 124 PID 3608 set thread context of 1724 3608 spoolsv.exe 126 PID 4744 set thread context of 4912 4744 spoolsv.exe 127 PID 2832 set thread context of 376 2832 spoolsv.exe 128 PID 3452 set thread context of 4012 3452 spoolsv.exe 129 PID 1032 set thread context of 4264 1032 spoolsv.exe 131 PID 2072 set thread context of 2852 2072 spoolsv.exe 133 PID 2600 set thread context of 1352 2600 spoolsv.exe 134 PID 2240 set thread context of 3604 2240 spoolsv.exe 135 PID 4732 set thread context of 2492 4732 spoolsv.exe 137 PID 2016 set thread context of 4936 2016 spoolsv.exe 139 PID 460 set thread context of 3920 460 spoolsv.exe 140 PID 2948 set thread context of 712 2948 spoolsv.exe 142 PID 5112 set thread context of 5104 5112 spoolsv.exe 144 PID 4556 set thread context of 4752 4556 spoolsv.exe 145 PID 620 set thread context of 4344 620 spoolsv.exe 147 PID 4108 set thread context of 4568 4108 spoolsv.exe 148 PID 3700 set thread context of 3852 3700 spoolsv.exe 150 PID 3308 set thread context of 2168 3308 spoolsv.exe 151 PID 4340 set thread context of 3504 4340 spoolsv.exe 153 PID 1176 set thread context of 1568 1176 spoolsv.exe 154 PID 4540 set thread context of 2044 4540 spoolsv.exe 156 PID 1944 set thread context of 1408 1944 spoolsv.exe 158 PID 392 set thread context of 3428 392 spoolsv.exe 159 PID 4472 set thread context of 2404 4472 spoolsv.exe 162 PID 3596 set thread context of 3388 3596 spoolsv.exe 163 PID 3268 set thread context of 2448 3268 spoolsv.exe 165 PID 4412 set thread context of 628 4412 spoolsv.exe 170 PID 4432 set thread context of 2008 4432 explorer.exe 172 PID 864 set thread context of 2012 864 explorer.exe 176 PID 3084 set thread context of 3400 3084 spoolsv.exe 177 PID 3672 set thread context of 720 3672 explorer.exe 181 PID 1392 set thread context of 1232 1392 spoolsv.exe 182 PID 4356 set thread context of 4688 4356 spoolsv.exe 186 PID 1580 set thread context of 4840 1580 explorer.exe 188 -
Drops file in Windows directory 63 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 4088 explorer.exe 216 spoolsv.exe 216 spoolsv.exe 1724 spoolsv.exe 1724 spoolsv.exe 4912 spoolsv.exe 4912 spoolsv.exe 376 spoolsv.exe 376 spoolsv.exe 4012 spoolsv.exe 4012 spoolsv.exe 4264 spoolsv.exe 4264 spoolsv.exe 2852 spoolsv.exe 2852 spoolsv.exe 1352 spoolsv.exe 1352 spoolsv.exe 3604 spoolsv.exe 3604 spoolsv.exe 2492 spoolsv.exe 2492 spoolsv.exe 4936 spoolsv.exe 4936 spoolsv.exe 3920 spoolsv.exe 3920 spoolsv.exe 712 spoolsv.exe 712 spoolsv.exe 5104 spoolsv.exe 5104 spoolsv.exe 4752 spoolsv.exe 4752 spoolsv.exe 4344 spoolsv.exe 4344 spoolsv.exe 4568 spoolsv.exe 4568 spoolsv.exe 3852 spoolsv.exe 3852 spoolsv.exe 2168 spoolsv.exe 2168 spoolsv.exe 3504 spoolsv.exe 3504 spoolsv.exe 1568 spoolsv.exe 1568 spoolsv.exe 2044 spoolsv.exe 2044 spoolsv.exe 1408 spoolsv.exe 1408 spoolsv.exe 3428 spoolsv.exe 3428 spoolsv.exe 2404 spoolsv.exe 2404 spoolsv.exe 3388 spoolsv.exe 3388 spoolsv.exe 2448 spoolsv.exe 2448 spoolsv.exe 628 spoolsv.exe 628 spoolsv.exe 2008 explorer.exe 2008 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2292 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 82 PID 5080 wrote to memory of 2292 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 82 PID 5080 wrote to memory of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 5080 wrote to memory of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 5080 wrote to memory of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 5080 wrote to memory of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 5080 wrote to memory of 1204 5080 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 91 PID 1204 wrote to memory of 4700 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 92 PID 1204 wrote to memory of 4700 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 92 PID 1204 wrote to memory of 4700 1204 e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe 92 PID 4700 wrote to memory of 4088 4700 explorer.exe 95 PID 4700 wrote to memory of 4088 4700 explorer.exe 95 PID 4700 wrote to memory of 4088 4700 explorer.exe 95 PID 4700 wrote to memory of 4088 4700 explorer.exe 95 PID 4700 wrote to memory of 4088 4700 explorer.exe 95 PID 4088 wrote to memory of 432 4088 explorer.exe 96 PID 4088 wrote to memory of 432 4088 explorer.exe 96 PID 4088 wrote to memory of 432 4088 explorer.exe 96 PID 4088 wrote to memory of 3608 4088 explorer.exe 97 PID 4088 wrote to memory of 3608 4088 explorer.exe 97 PID 4088 wrote to memory of 3608 4088 explorer.exe 97 PID 4088 wrote to memory of 4744 4088 explorer.exe 98 PID 4088 wrote to memory of 4744 4088 explorer.exe 98 PID 4088 wrote to memory of 4744 4088 explorer.exe 98 PID 4088 wrote to memory of 2832 4088 explorer.exe 99 PID 4088 wrote to memory of 2832 4088 explorer.exe 99 PID 4088 wrote to memory of 2832 4088 explorer.exe 99 PID 4088 wrote to memory of 3452 4088 explorer.exe 100 PID 4088 wrote to memory of 3452 4088 explorer.exe 100 PID 4088 wrote to memory of 3452 4088 explorer.exe 100 PID 4088 wrote to memory of 1032 4088 explorer.exe 101 PID 4088 wrote to memory of 1032 4088 explorer.exe 101 PID 4088 wrote to memory of 1032 4088 explorer.exe 101 PID 4088 wrote to memory of 2072 4088 explorer.exe 102 PID 4088 wrote to memory of 2072 4088 explorer.exe 102 PID 4088 wrote to memory of 2072 4088 explorer.exe 102 PID 4088 wrote to memory of 2600 4088 explorer.exe 103 PID 4088 wrote to memory of 2600 4088 explorer.exe 103 PID 4088 wrote to memory of 2600 4088 explorer.exe 103 PID 4088 wrote to memory of 2240 4088 explorer.exe 104 PID 4088 wrote to memory of 2240 4088 explorer.exe 104 PID 4088 wrote to memory of 2240 4088 explorer.exe 104 PID 4088 wrote to memory of 4732 4088 explorer.exe 105 PID 4088 wrote to memory of 4732 4088 explorer.exe 105 PID 4088 wrote to memory of 4732 4088 explorer.exe 105 PID 4088 wrote to memory of 2016 4088 explorer.exe 106 PID 4088 wrote to memory of 2016 4088 explorer.exe 106 PID 4088 wrote to memory of 2016 4088 explorer.exe 106 PID 4088 wrote to memory of 460 4088 explorer.exe 107 PID 4088 wrote to memory of 460 4088 explorer.exe 107 PID 4088 wrote to memory of 460 4088 explorer.exe 107 PID 4088 wrote to memory of 2948 4088 explorer.exe 108 PID 4088 wrote to memory of 2948 4088 explorer.exe 108 PID 4088 wrote to memory of 2948 4088 explorer.exe 108 PID 4088 wrote to memory of 5112 4088 explorer.exe 109 PID 4088 wrote to memory of 5112 4088 explorer.exe 109 PID 4088 wrote to memory of 5112 4088 explorer.exe 109 PID 4088 wrote to memory of 4556 4088 explorer.exe 110 PID 4088 wrote to memory of 4556 4088 explorer.exe 110 PID 4088 wrote to memory of 4556 4088 explorer.exe 110 PID 4088 wrote to memory of 620 4088 explorer.exe 111 PID 4088 wrote to memory of 620 4088 explorer.exe 111 PID 4088 wrote to memory of 620 4088 explorer.exe 111 PID 4088 wrote to memory of 4108 4088 explorer.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e558fd0aa8ad3a6357fa3bcc63edbfc5_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:216 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4432 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3608 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4744 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2832 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:376
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3452 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4012
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4264 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:864 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2012
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2600 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2240 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4732 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3672 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:720
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:460 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1580 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:620 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4108 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4568 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2796 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4816
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3700 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4340 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1176 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3660 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4668
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4540 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1944 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:392 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3428 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1748 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4132
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4472 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2448 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3296 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1664
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:628 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3260 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:264
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3400 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:2128 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2536
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1392 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1232
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4688 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:5072
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2712 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4560
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:808
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4704
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4248
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1660 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:528
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1080
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4780 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:964
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3972 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:740 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4536
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2260
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2820 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3588
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1316
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:860
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4468
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4724
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1116 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1260
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1376
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4084
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3704
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3796
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:512
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2564
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5096
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4632
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4884
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2780
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2344
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3456
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5116a00d28904a107db9d55c9a1cad1d3
SHA124e047af60a45b4accc24a9fccab29ba8e033f30
SHA25651b262ce61b880d9b17c773f7311d34f41463f837d964e92335c2799c9f962f3
SHA51205a351bae6a7a3c990507ec12a6c058ee1d442856cdfdd1904e2503860b56348a3b706810dc1f2fb832883e33f64a010238cc2c60e32318729ee5bb12ceae0e4
-
Filesize
2.2MB
MD50af4ee8a2c790368d4313375be43bdfc
SHA104b0dd7e77b3366dd199439bc9d85cec39b56ca6
SHA256a6d1468dcdc8ebcd83bb1f1b85d961c6d2b4a61e5a18de5e401f1067c730c809
SHA5126606a35301e07d1643f11080b1fa282913bd51b53fc47f8833a2216451f3c2f45c21ef52e16921997fe86d44222b1a571de0cb649c4b25b1713be3c0f4c41f50