Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 17:37

General

  • Target

    e75c2953c3e0c4535a3dd724edaa4342_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    e75c2953c3e0c4535a3dd724edaa4342

  • SHA1

    e126f2cf10f334d64b4b5c36a727f9a4ac736cb1

  • SHA256

    0e1247282330c64018ed25922204310262f92cf7a5fa311ce3d98bb2dd85f419

  • SHA512

    8df26b2eabd132264a4cca26f3c408ff0f7adde62dd8de43882e1524cada6734954551c700364b377096dc27bb6e2ad2ad5199d5b9d1a34f5465b8a009525922

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZR:0UzeyQMS4DqodCnoe+iitjWwwl

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 53 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e75c2953c3e0c4535a3dd724edaa4342_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e75c2953c3e0c4535a3dd724edaa4342_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3432
      • C:\Users\Admin\AppData\Local\Temp\e75c2953c3e0c4535a3dd724edaa4342_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\e75c2953c3e0c4535a3dd724edaa4342_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4808
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4004
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3812
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:552
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2420
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:5032
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3596
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2200
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1792
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:3824
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1848
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1556
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3988
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:448
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1508
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4528
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3552
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:696
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2060
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4740
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:464
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3420
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2516
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4468
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2576
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3156
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:1120
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2660
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3524
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:456
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:392
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4248
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4212
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3900
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1288
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4820
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3020
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4348
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:1012
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4416
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1624
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2312
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3408
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1936
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2852
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4672
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3300
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3232
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5112
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2980
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2920
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2556
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:5036
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2252
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4744
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3584
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3228
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2872
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:1804
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3028
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:1084
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4424
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4972
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2988
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:2272
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:1564
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:4648
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1464
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2128
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4560
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:4436
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3036
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2764
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1860
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                      PID:2932
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:5096
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:3124
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:440
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:2540
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:220
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:3068
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:3048
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:1348
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4848
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:4056
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Drops file in Windows directory
                          PID:2644
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4488
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:1412
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:2244
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4288
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                          PID:2288
                          • \??\c:\windows\system\explorer.exe
                            c:\windows\system\explorer.exe
                            7⤵
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:1968
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Suspicious use of SetThreadContext
                        PID:776
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:1864
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:2720
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:4636
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:1368
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3920
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3388
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:1544
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4496
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:3800
                              • \??\c:\windows\system\explorer.exe
                                c:\windows\system\explorer.exe
                                7⤵
                                • Drops file in Windows directory
                                PID:1232
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Suspicious use of SetThreadContext
                            PID:3096
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:2784
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1956
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                  PID:3604
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:852
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:452
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4620
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3148
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1632
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                      PID:4916
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:3652
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:2696
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:4516
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2392
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:1668
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:3672
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:3508
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:3600
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:5024
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2716
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:4456
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:4392
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Drops file in Windows directory
                                  PID:5044
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                    PID:1880
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Drops file in Windows directory
                                    PID:3312
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:2452
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                      PID:3040
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:856
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                        PID:884
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                1⤵
                                  PID:1132

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\Parameters.ini

                                  Filesize

                                  74B

                                  MD5

                                  6687785d6a31cdf9a5f80acb3abc459b

                                  SHA1

                                  1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                  SHA256

                                  3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                  SHA512

                                  5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                • C:\Windows\System\explorer.exe

                                  Filesize

                                  2.2MB

                                  MD5

                                  952268aeb2cb7661dd1a5fa551359d5a

                                  SHA1

                                  9534c2b08527f4154f86a988f798ce5f509d2dc4

                                  SHA256

                                  c60aaba3f0f3f3c0f97ec671dabaa95366ab538e7a19f063836a1edd5689928c

                                  SHA512

                                  6ebacb214934bb8e2b199bc6df9e47c09467bdac2bc9e85f45bd4cc19b0b6cf1c34ea4662d2246fee1e0339236d34d31d38bd1845878e3c33f8d0cd44b609cf8

                                • C:\Windows\System\spoolsv.exe

                                  Filesize

                                  2.2MB

                                  MD5

                                  4ebf2c962d4c26ecbfb719aa0547c6a7

                                  SHA1

                                  f9cd574c93242f1eef4f4d03068c093b171f7c40

                                  SHA256

                                  d27e926b311f00f0271f7511bc2a7e70bfec35f896fdb8409d3342b936793302

                                  SHA512

                                  827fb296571690fa8b748aedece23f6532cba51e20bb3aad0effb86fde8d652efa3695e5ac638ef4ac01781f59fc8f8f60d205af7a6c312fe94de7e3ac3d0386

                                • memory/392-2412-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/448-1049-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/456-1477-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/464-2217-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/464-2221-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/552-1991-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/552-739-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/696-1105-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/1012-4190-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1084-2928-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1120-3841-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1288-2515-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1348-5421-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1368-5117-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1412-4232-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1508-2197-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1508-2369-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1544-5064-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1556-1048-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/1624-2615-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1632-5568-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1792-2003-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1792-1999-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1804-2914-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1804-2917-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1848-2025-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1848-2012-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1864-4943-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/1936-1803-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2060-2206-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2200-921-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2200-2001-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2272-2989-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2288-4509-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2312-1721-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2420-1989-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2420-2144-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2516-2308-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2516-2311-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2540-5228-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2556-1997-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2576-2392-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2660-1415-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2764-3105-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2852-2636-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2872-2103-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2920-2755-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2920-2752-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2932-3130-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/2980-1983-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3020-2605-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3020-2818-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3068-3555-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3068-3681-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3124-3449-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3124-3312-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3228-2854-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3232-1982-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3300-2670-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3408-2623-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3408-2628-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3420-1237-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3524-2404-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3552-3565-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3584-2010-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3596-3322-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3604-5359-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3812-3974-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3812-674-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3812-89-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3824-2026-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3824-992-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3900-1595-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3988-2104-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4004-84-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4004-90-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4056-3884-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4212-2492-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4248-1548-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4416-1698-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4436-3042-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4468-1353-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4620-5447-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4648-4972-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4672-1880-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4740-1166-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4744-4602-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4808-40-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4808-78-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4808-77-0x0000000000440000-0x0000000000509000-memory.dmp

                                  Filesize

                                  804KB

                                • memory/4808-39-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4820-1596-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4972-2936-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/5036-2981-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/5036-2836-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/5112-0-0x0000000002360000-0x0000000002361000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5112-2743-0x0000000000400000-0x000000000043E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/5112-43-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/5112-36-0x0000000000400000-0x00000000005D3000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/5112-37-0x0000000002360000-0x0000000002361000-memory.dmp

                                  Filesize

                                  4KB