Analysis
-
max time kernel
148s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 06:56
Behavioral task
behavioral1
Sample
5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe
Resource
win7-20240903-en
General
-
Target
5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe
-
Size
2.2MB
-
MD5
e71febfc00b698ca0cd033ba72054bb3
-
SHA1
7c899d12f6904d232e96183d4d02cd0b57ccf20c
-
SHA256
5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa
-
SHA512
ec864929135dcd2e72554d5bd5bf2d85ecf03c144789f5ffc95a4fcf823663a64ccef0ce5b32029d54de1a53af3ef9a1208252c1a2a21d11b92e2ed196d0a0f8
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZJ:0UzeyQMS4DqodCnoe+iitjWwwF
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe -
Executes dropped EXE 64 IoCs
pid Process 5092 explorer.exe 4724 explorer.exe 3156 spoolsv.exe 1072 spoolsv.exe 32 spoolsv.exe 5088 spoolsv.exe 4840 spoolsv.exe 3068 spoolsv.exe 1828 spoolsv.exe 3704 spoolsv.exe 1352 spoolsv.exe 2212 spoolsv.exe 4656 spoolsv.exe 3432 spoolsv.exe 1384 spoolsv.exe 1712 spoolsv.exe 1056 spoolsv.exe 524 spoolsv.exe 4856 spoolsv.exe 4592 spoolsv.exe 4616 spoolsv.exe 760 spoolsv.exe 5112 spoolsv.exe 2528 spoolsv.exe 2912 spoolsv.exe 1788 spoolsv.exe 4212 spoolsv.exe 1628 spoolsv.exe 2432 spoolsv.exe 4596 spoolsv.exe 2356 spoolsv.exe 3940 spoolsv.exe 4020 spoolsv.exe 4940 explorer.exe 3464 spoolsv.exe 1572 spoolsv.exe 3760 spoolsv.exe 1076 spoolsv.exe 4800 spoolsv.exe 948 spoolsv.exe 4764 spoolsv.exe 3548 spoolsv.exe 4300 spoolsv.exe 2808 explorer.exe 4364 spoolsv.exe 2816 spoolsv.exe 1148 spoolsv.exe 3028 spoolsv.exe 5068 spoolsv.exe 1364 spoolsv.exe 3052 explorer.exe 4824 spoolsv.exe 4396 spoolsv.exe 4464 spoolsv.exe 3536 spoolsv.exe 224 spoolsv.exe 2988 spoolsv.exe 4156 explorer.exe 2880 spoolsv.exe 3456 spoolsv.exe 3056 spoolsv.exe 4484 spoolsv.exe 4572 spoolsv.exe 3856 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 51 IoCs
description pid Process procid_target PID 4632 set thread context of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 5092 set thread context of 4724 5092 explorer.exe 97 PID 3156 set thread context of 4020 3156 spoolsv.exe 128 PID 1072 set thread context of 3464 1072 spoolsv.exe 130 PID 32 set thread context of 3760 32 spoolsv.exe 132 PID 5088 set thread context of 1076 5088 spoolsv.exe 133 PID 4840 set thread context of 4800 4840 spoolsv.exe 134 PID 3068 set thread context of 948 3068 spoolsv.exe 135 PID 1828 set thread context of 4764 1828 spoolsv.exe 136 PID 3704 set thread context of 4300 3704 spoolsv.exe 138 PID 1352 set thread context of 4364 1352 spoolsv.exe 140 PID 2212 set thread context of 2816 2212 spoolsv.exe 141 PID 4656 set thread context of 1148 4656 spoolsv.exe 142 PID 3432 set thread context of 3028 3432 spoolsv.exe 143 PID 1384 set thread context of 1364 1384 spoolsv.exe 145 PID 1712 set thread context of 4824 1712 spoolsv.exe 147 PID 1056 set thread context of 4396 1056 spoolsv.exe 148 PID 524 set thread context of 4464 524 spoolsv.exe 149 PID 4856 set thread context of 3536 4856 spoolsv.exe 150 PID 4592 set thread context of 2988 4592 spoolsv.exe 152 PID 4616 set thread context of 2880 4616 spoolsv.exe 154 PID 760 set thread context of 3456 760 spoolsv.exe 155 PID 5112 set thread context of 3056 5112 spoolsv.exe 156 PID 2528 set thread context of 4484 2528 spoolsv.exe 157 PID 2912 set thread context of 3856 2912 spoolsv.exe 159 PID 1788 set thread context of 4472 1788 spoolsv.exe 161 PID 4212 set thread context of 3684 4212 spoolsv.exe 162 PID 1628 set thread context of 3232 1628 spoolsv.exe 163 PID 2432 set thread context of 1552 2432 spoolsv.exe 164 PID 4596 set thread context of 3664 4596 spoolsv.exe 166 PID 2356 set thread context of 4792 2356 spoolsv.exe 167 PID 3940 set thread context of 4832 3940 spoolsv.exe 171 PID 4940 set thread context of 3780 4940 explorer.exe 176 PID 1572 set thread context of 684 1572 spoolsv.exe 177 PID 3548 set thread context of 452 3548 spoolsv.exe 182 PID 2808 set thread context of 1596 2808 explorer.exe 184 PID 3052 set thread context of 4404 3052 explorer.exe 188 PID 4156 set thread context of 4648 4156 explorer.exe 195 PID 224 set thread context of 4516 224 spoolsv.exe 196 PID 4572 set thread context of 4060 4572 spoolsv.exe 202 PID 3568 set thread context of 2268 3568 explorer.exe 204 PID 4888 set thread context of 3152 4888 spoolsv.exe 206 PID 3312 set thread context of 3680 3312 explorer.exe 207 PID 4508 set thread context of 3712 4508 spoolsv.exe 208 PID 2236 set thread context of 752 2236 spoolsv.exe 209 PID 544 set thread context of 928 544 explorer.exe 212 PID 4312 set thread context of 528 4312 spoolsv.exe 213 PID 3016 set thread context of 4892 3016 spoolsv.exe 214 PID 2892 set thread context of 3792 2892 spoolsv.exe 216 PID 4600 set thread context of 2324 4600 explorer.exe 218 PID 3848 set thread context of 1084 3848 spoolsv.exe 219 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4724 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4724 explorer.exe 4020 spoolsv.exe 4020 spoolsv.exe 3464 spoolsv.exe 3464 spoolsv.exe 3760 spoolsv.exe 3760 spoolsv.exe 1076 spoolsv.exe 1076 spoolsv.exe 4800 spoolsv.exe 4800 spoolsv.exe 948 spoolsv.exe 948 spoolsv.exe 4764 spoolsv.exe 4764 spoolsv.exe 4300 spoolsv.exe 4300 spoolsv.exe 4364 spoolsv.exe 4364 spoolsv.exe 2816 spoolsv.exe 2816 spoolsv.exe 1148 spoolsv.exe 1148 spoolsv.exe 3028 spoolsv.exe 3028 spoolsv.exe 1364 spoolsv.exe 1364 spoolsv.exe 4824 spoolsv.exe 4824 spoolsv.exe 4396 spoolsv.exe 4396 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 3536 spoolsv.exe 3536 spoolsv.exe 2988 spoolsv.exe 2988 spoolsv.exe 2880 spoolsv.exe 2880 spoolsv.exe 3456 spoolsv.exe 3456 spoolsv.exe 3056 spoolsv.exe 3056 spoolsv.exe 4484 spoolsv.exe 4484 spoolsv.exe 3856 spoolsv.exe 3856 spoolsv.exe 4472 spoolsv.exe 4472 spoolsv.exe 3684 spoolsv.exe 3684 spoolsv.exe 3232 spoolsv.exe 3232 spoolsv.exe 1552 spoolsv.exe 1552 spoolsv.exe 3664 spoolsv.exe 3664 spoolsv.exe 4792 spoolsv.exe 4792 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1088 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 84 PID 4632 wrote to memory of 1088 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 84 PID 4632 wrote to memory of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 4632 wrote to memory of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 4632 wrote to memory of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 4632 wrote to memory of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 4632 wrote to memory of 2848 4632 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 93 PID 2848 wrote to memory of 5092 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 94 PID 2848 wrote to memory of 5092 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 94 PID 2848 wrote to memory of 5092 2848 5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe 94 PID 5092 wrote to memory of 4724 5092 explorer.exe 97 PID 5092 wrote to memory of 4724 5092 explorer.exe 97 PID 5092 wrote to memory of 4724 5092 explorer.exe 97 PID 5092 wrote to memory of 4724 5092 explorer.exe 97 PID 5092 wrote to memory of 4724 5092 explorer.exe 97 PID 4724 wrote to memory of 3156 4724 explorer.exe 98 PID 4724 wrote to memory of 3156 4724 explorer.exe 98 PID 4724 wrote to memory of 3156 4724 explorer.exe 98 PID 4724 wrote to memory of 1072 4724 explorer.exe 99 PID 4724 wrote to memory of 1072 4724 explorer.exe 99 PID 4724 wrote to memory of 1072 4724 explorer.exe 99 PID 4724 wrote to memory of 32 4724 explorer.exe 100 PID 4724 wrote to memory of 32 4724 explorer.exe 100 PID 4724 wrote to memory of 32 4724 explorer.exe 100 PID 4724 wrote to memory of 5088 4724 explorer.exe 101 PID 4724 wrote to memory of 5088 4724 explorer.exe 101 PID 4724 wrote to memory of 5088 4724 explorer.exe 101 PID 4724 wrote to memory of 4840 4724 explorer.exe 102 PID 4724 wrote to memory of 4840 4724 explorer.exe 102 PID 4724 wrote to memory of 4840 4724 explorer.exe 102 PID 4724 wrote to memory of 3068 4724 explorer.exe 103 PID 4724 wrote to memory of 3068 4724 explorer.exe 103 PID 4724 wrote to memory of 3068 4724 explorer.exe 103 PID 4724 wrote to memory of 1828 4724 explorer.exe 104 PID 4724 wrote to memory of 1828 4724 explorer.exe 104 PID 4724 wrote to memory of 1828 4724 explorer.exe 104 PID 4724 wrote to memory of 3704 4724 explorer.exe 105 PID 4724 wrote to memory of 3704 4724 explorer.exe 105 PID 4724 wrote to memory of 3704 4724 explorer.exe 105 PID 4724 wrote to memory of 1352 4724 explorer.exe 106 PID 4724 wrote to memory of 1352 4724 explorer.exe 106 PID 4724 wrote to memory of 1352 4724 explorer.exe 106 PID 4724 wrote to memory of 2212 4724 explorer.exe 107 PID 4724 wrote to memory of 2212 4724 explorer.exe 107 PID 4724 wrote to memory of 2212 4724 explorer.exe 107 PID 4724 wrote to memory of 4656 4724 explorer.exe 108 PID 4724 wrote to memory of 4656 4724 explorer.exe 108 PID 4724 wrote to memory of 4656 4724 explorer.exe 108 PID 4724 wrote to memory of 3432 4724 explorer.exe 109 PID 4724 wrote to memory of 3432 4724 explorer.exe 109 PID 4724 wrote to memory of 3432 4724 explorer.exe 109 PID 4724 wrote to memory of 1384 4724 explorer.exe 110 PID 4724 wrote to memory of 1384 4724 explorer.exe 110 PID 4724 wrote to memory of 1384 4724 explorer.exe 110 PID 4724 wrote to memory of 1712 4724 explorer.exe 111 PID 4724 wrote to memory of 1712 4724 explorer.exe 111 PID 4724 wrote to memory of 1712 4724 explorer.exe 111 PID 4724 wrote to memory of 1056 4724 explorer.exe 112 PID 4724 wrote to memory of 1056 4724 explorer.exe 112 PID 4724 wrote to memory of 1056 4724 explorer.exe 112 PID 4724 wrote to memory of 524 4724 explorer.exe 113 PID 4724 wrote to memory of 524 4724 explorer.exe 113 PID 4724 wrote to memory of 524 4724 explorer.exe 113 PID 4724 wrote to memory of 4856 4724 explorer.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe"C:\Users\Admin\AppData\Local\Temp\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe"C:\Users\Admin\AppData\Local\Temp\5bd6db071fdb1fe9610f5a24eb6216dc0f052f4961001e57042a6760af48e9fa.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3156 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4020 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4940 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3780
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:32 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5088 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4840 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:948
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1596
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1352 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4656 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3052 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4404
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1712 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1056 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4464
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4856 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4156 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4648
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3456
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5112 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2528 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3568 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2268
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1788 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1628 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2356 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4792 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3312 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4832
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:544 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:928
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:684 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:4600 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3548 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:452 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4952
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:5068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4516
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3092
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4060
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:376
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4888 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4508 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:752
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3284
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4312 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:528
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3016 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2892 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3792
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2360
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:3848 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4956
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4412
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2596
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:232
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2752
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:644
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3308
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:840
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4612
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4740
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3732
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:364
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5a7d05a14dae3f2e64bf05d0501adcd3e
SHA1db0968a37988430cf26a8f8b03faeea730bf9029
SHA25684fab0a98e077f98916e65bd8df08cdd449dcacd761483e2572b1127a1e93305
SHA512938ac6f23720eefc17b6b15f609f17b852c3d1f1f3df803b2f137c0d353939241e39d7a405452de52b7b2bc0cc81d44526038917c6a9af6511644c76c193374e
-
Filesize
2.2MB
MD5aa2f0cdddcf61e4e417c387a2ac68434
SHA198c89b1d7807e125db36b871c05c3cec93a7a073
SHA2560bfb55bad0e56983b130a5ec7a9e3d57535aa275f04b170dc736cd61a01294e5
SHA5125439d74e1ad59d9720110952ee8c0cf4600aa9c6e5236abb6218bc58b1c40e5458f8be84e4559ca3bb3dd254931e2859a1334027eace331268316f0e009757a9